Social Networks, Terrorism and Counter-­Terrorism

Total Page:16

File Type:pdf, Size:1020Kb

Social Networks, Terrorism and Counter-­Terrorism Downloaded by [University of Defence] at 20:58 19 May 2016 Social Networks, Terrorism and Counter- terrorism This book examines two key themes in terrorism studies, the radicalization process and counter-terrorism policies, through the lens of social networks. The book aims to show that networks should be at the forefront not only when analyzing terrorists but also when assessing the responses to their actions. The volume makes a unique contribution by addressing two relatively new themes for terrorism studies. First, it puts social relations and cooperation issues at the forefront—an approach often identified as crucial to future breakthroughs in the field. Second, many contributions tackle the role of the Internet in the process of radicalization and in recruitment more generally, a highly debated topic in the field today. In addition, the book provides a valuable mix of review essays, crit- ical essays, and original empirical studies. This balanced approach is also found in the topics covered by the authors, as well as their academic disciplines, which include sociology, computer science, geography, history, engineering and crimi- nology as well as political science. Many of the true advances in terrorism studies depend on the successful collaboration of multi- disciplinary teams, each with a different set of methodological and conceptual tools. This volume reflects the newfound diversity in this field and is a true product of its time. This book will be of much interest to students of terrorism studies, social net- works, security studies, sociology, criminology and international relations in general. Martin Bouchard is Associate Professor at the School of Criminology, Simon Fraser University, Canada. He is co- editor of Illegal Markets and the Economics Downloaded by [University of Defence] at 20:58 19 May 2016 of Organised Crime (Routledge 2010) and World Wide Weed: Global Trends in Cannabis Cultivation and its Control (Ashgate 2011) and editor of Advances in Research on Illicit Networks (Routledge 2015). Contemporary Terrorism Studies Understanding Terrorist Innovation Technology, tactics and global trends Adam Dolnik The Strategy of Terrorism How it works, why it fails Peter Neumann and M.L.R. Smith Female Terrorism and Militancy Agency, utility, and organization Edited by Cindy D. Ness Women and Terrorism Female activity in domestic and international terror groups Margaret Gonzalez- Perez The Psychology of Strategic Terrorism Public and government responses to attack Ben Sheppard The De- radicalization of Jihadists Transforming armed Islamist movements Downloaded by [University of Defence] at 20:58 19 May 2016 Omar Ashour Targeting Terrorist Financing International cooperation and new regimes Arabinda Acharya Managing Terrorism and Insurgency Regeneration, recruitment and attrition Cameron I. Crouch Religion and Political Violence Sacred protest in the modern world Jennifer L. Jefferis International Terrorism Post-9/11 Comparative dynamics and responses Edited by Asaf Siniver Talking to Terrorists Concessions and the renunciation of violence Carolin Goerzig Freedom and Terror Reason and unreason in politics Abraham Kaplan and Gabriel Weimann Evaluating Counterterrorism Performance A comparative study Beatrice de Graaf The EU and Counter- terrorism Politics, polity and policies after 9/11 Javier Argomaniz The Evolution of EU Counter- terrorism European security policy after 9/11 Raphael Bossong Conducting Terrorism Field Research A guide Edited by Adam Dolnik US–UK Counter- terrorism after 9/11 A qualitative approach Downloaded by [University of Defence] at 20:58 19 May 2016 Edgar B. Tembo Transforming Violent Political Movements Rebels today, what tomorrow? Kevin Grisham Radicalization in Western Europe Integration, public discourse and loss of identity among Muslim communities Carolin Goerzig and Khaled Al-Hashimi Putting Terrorism in Context Lessons from the Global Terrorism Database Gary LaFree, Laura Dugan and Erin Miller Al Qaeda’s Global Crisis The Islamic State, takfir, and the genocide of Muslims V.G. Julie Rajan Social Networks, Terrorism and Counter- terrorism Radical and connected Edited by Martin Bouchard Downloaded by [University of Defence] at 20:58 19 May 2016 Social Networks, Terrorism and Counter- terrorism Radical and connected Edited by Martin Bouchard Downloaded by [University of Defence] at 20:58 19 May 2016 First published 2015 by Routledge 2 Park Square, Milton Park, Abingdon, Oxon OX14 4RN and by Routledge 711 Third Avenue, New York 10017 Routledge is an imprint of the Taylor and Francis Group, an informa business © 2015 selection and editorial matter, Martin Bouchard; individual chapters, the contributors The right of the editor to be identified as the author of the editorial matter, and of the authors for their individual chapters, has been asserted in accordance with sections 77 and 78 of the Copyright, Designs and Patents Act 1988. All rights reserved. No part of this book may be reprinted or reproduced or utilized in any form or by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying and recording, or in any information storage or retrieval system, without permission in writing from the publishers. Trademark notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library Library of Congress Cataloging- in-Publication Data Social networks, terrorism and counter-terrorism : radical and connected / edited by Martin Bouchard. pages cm. – (Contemporary terrorism studies) Includes bibliographical references and index. 1. Terrorism. 2. Internet and terrorism. 3. Terrorists–Social networks. 4. Terrorism–Prevention. I. Bouchard, Martin, 1981- editor. HV6431.S6433 2015 363.325–dc23 2014048211 ISBN: 978-1-138-82856-8 (hbk) ISBN: 978-1-315-73829-1 (ebk) Typeset in Times New Roman by Wearset Ltd, Boldon, Tyne and Wear Downloaded by [University of Defence] at 20:58 19 May 2016 Contents List of figures ix List of tables x Notes on contributors xi Foreword xvi DANIel HIeBeRT AND lORNe l. DAwSON 1 Radical and connected: an introduction 1 MARTIN BOUCHARD AND PHIlIPPA leveY PART I Terrorism and radicalization: history, networks and the Internet 9 2 The roots of terrorism in the Middle East 11 ANDRé GeROlYMATOS 3 The gray cygnet problem in terrorism research 34 lAURA HUeY, JOSePH vARANeSe AND RYAN BROll 4 Researching terrorism and counter-terrorism through a network lens 48 Downloaded by [University of Defence] at 20:58 19 May 2016 MARTIN BOUCHARD AND ReBeCCA NASH 5 Travel broadens the network: turning points in the network trajectory of an American jihadi 61 ReBeCCA NASH AND MARTIN BOUCHARD 6 A radical sociability: in defense of an online/offline multidimensional approach to radicalization 82 BeNJAMIN DUCOl viii Contents 7 Terrorist and extremist organizations’ use of the Internet for recruitment 105 G A R T H D A v I e S , M A R T I N B ouchard , e D I T H w U , KIlA JOFFReS AND RICHARD FRANK 8 Exploring the behavioral and attitudinal correlates of civilian cyberattacks 128 T H O M A S J . HO l T , M A X KI l G e R , l I C H U N CHIANG A N D CHU- SING YANG PART II Counter- terrorism: prospects, pitfalls, policies 153 9 Security networks and counter- terrorism: a reflection on the limits of adversarial isomorphism 155 BeNOîT DUPONT 10 The promise and perils of integrated models of public safety in Canada 175 veRONICA M. KITCHeN AND ADAM MOlNAR 11 A systematic approach to developing a computational framework for counter- terrorism and public safety 196 ANDRew J. PARK AND HeRBeRT H. TSANG 12 Radical and connected: concluding thoughts and future research 218 MARTIN BOUCHARD AND evAN THOMAS Index 231 Downloaded by [University of Defence] at 20:58 19 May 2016 Figures 5.1 Full personal network of Hammami from his pre-jihad days to Al- Shabaab 69 5.2 Hammami’s pre-jihad network in Daphne, USA, and Toronto, Canada 73 5.3 Hammami’s network in Alexandria, egypt, and Mogadishu, Somalia 74 5.4 Hammami’s Somalia network—three cities combined 75 5.5 Hammami’s network density by time period and location 76 5.6 The proportion of ties in Hammami’s network by time period and location 77 6.1 Situational action theory: simplified framework 92 6.2 Online and offlines life-spheres and the production of a sociability 95 6.3 The emergence of a radical sociability 96 7.1 Recruitment and extremism scales 121 11.1 Classification of crowds 200 11.2 The 3D visualization of a crowd in the GeNIUS system 201 11.3 Initial setup and plots of a typical run in Scenarios A and B 204 11.4 The layout of the simulation of the Boston Marathon bombings 206 11.5 Simulations of the Boston Marathon bombings 207 11.6 Simulations of the westgate Shopping Mall attack 208 11.7 Initial setup and plots of a typical run in Scenario C 210 Downloaded by [University of Defence] at 20:58 19 May 2016 11.8 The current setup of GeNIUS 214 Tables 5.1 Top 10 brokers in Hammami’s full network 71 7.1 The website extremism scale 116 7.2 The website recruitment scale 116 7.3 The recruitment checklist 118 7.4 Keywords 120 7.5 Typology of recruitment websites 123 7.6 Typology of recruitment websites—examples 124 7.7 General characteristics of sampled websites 125 8.1 Sample descriptives 134 8.2 Binary logistic regression models for defacing government servers 138 8.3 Binary logistic regression models for searching government servers 142 8.4 Binary logistic regression models for compromising military servers 144 9.1 Three organizational morphologies 159 Downloaded by [University of Defence] at 20:58 19 May 2016 Contributors Martin Bouchard is an associate professor of Criminology at Simon Fraser University, Canada, and director of the International Cybercrime Research Centre (ICCRC).
Recommended publications
  • The Influence of Terrorism on Discriminatory Attitudes and Behaviors
    Shades of Intolerance: The Influence of Terrorism on Discriminatory Attitudes and Behaviors in the United Kingdom and Canada. by Chuck Baker A Dissertation submitted to the Graduate School-Newark Rutgers, The State University of New Jersey In partial fulfillment of the requirements For the degree of Doctor of Philosophy Graduate Program in Global Affairs Written under the direction of Dr. Gregg Van Ryzin and approved by ___________________________________________________ ___________________________________________________ ___________________________________________________ ___________________________________________________ Newark, New Jersey May, 2015 Copyright page: © 2015 Chuck Baker All Rights Reserved ABSTRACT The Influence of Terrorism on Discriminatory Attitudes and Behaviors in the United Kingdom and Canada by Chuck Baker Dissertation Director: Dr. Gregg Van Ryzin, Ph.D. Terrorism has been shown to have a destabilizing impact upon the citizens of the nation- state in which it occurs, causing social distress, fear, and the desire for retribution (Cesari, 2010; Chebel d’Appollonia, 2012). Much of the recent work on 21st century terrorism carried out in the global north has placed the focus on terrorism being perpetuated by Middle East Muslims. In addition, recent migration trends show that the global north is becoming much more diverse as the highly populated global south migrates upward. Population growth in the global north is primarily due to increases in the minority presence, and these post-1960 changes have increased the diversity of historically more homogeneous nations like the United Kingdom and Canada. This research examines the influence of terrorism on discriminatory attitudes and behaviors, with a focus on the United Kingdom in the aftermath of the July 7, 2005 terrorist attacks in London.
    [Show full text]
  • Abraham Kaplan Papers 0054
    http://oac.cdlib.org/findaid/ark:/13030/c86q1z11 No online items Abraham Kaplan Papers 0054 California State Polytechnic University, Pomona. Special Collections and Archives 3801 West Temple Avenue Pomona, CA 91768 [email protected] 909-869-3775 Abraham Kaplan Papers 0054 0054 1 Title: Abraham Kaplan Papers Creator: Kaplan, Abraham, 1918-1993 Identifier/Call Number: 0054 Contributing Institution: California State Polytechnic University, Pomona. Special Collections and Archives Language of Material: English Physical Description: 17 boxes Date (inclusive): 1942-1989 Abstract: Abraham Kaplan (1918-1993) was a philosopher, an author and an educator. His collection contains correspondence, articles, lectures, speeches, book manuscripts, subject files, notes, and printed matter pertaining to his writings and academic career. Conditions Governing Access Advance notice required for access. Conditions Governing Use Unpublished manuscripts are protected by copyright. Permission to publish, quote, or reproduce must be secured from the repository and the copyright holder. Preferred Citation [Box/folder# or item name], Abraham Kaplan Papers, Collection no. 0054, University Archives, Special Collections and Archives, University Library, California State Polytechnic University, Pomona. Immediate Source of Acquisition The collection was transferred to the University Archives by Professor of Philosophy James Manley in 2001. Biographical / Historical Abraham Kaplan (1918-1993) was an American philosopher with a long and distinguished career. He was born June 11, 1918 to parents Joseph J. (a Rabbi) and Chava (Lerner) Kaplan in Odessa, Ukraine. Kaplan and his family immigrated to the United States in 1923 and he became a naturalized citizen in 1930. A student of philosopher Bertrand Russell, he graduated from the College of St.
    [Show full text]
  • Immigration Policy, Race Relations and Multiculturalism in Post-Colonial Great Britain Flora Macivor Épouse Lamoureux
    The Setting Sun : Immigration Policy, Race Relations and Multiculturalism in Post-Colonial Great Britain Flora Macivor Épouse Lamoureux To cite this version: Flora Macivor Épouse Lamoureux. The Setting Sun : Immigration Policy, Race Relations and Multi- culturalism in Post-Colonial Great Britain. History. 2010. dumas-00534579 HAL Id: dumas-00534579 https://dumas.ccsd.cnrs.fr/dumas-00534579 Submitted on 10 Nov 2010 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. UNIVERSITE DU SUD TOULON-VAR FACULTE DES LETTRES ET SCIENCES HUMAINES MASTER RECHERCHE : CIVILISATIONS CONTEMPORAINES ET COMPAREES ANNÉE 2009-2010, 1ERE SESSION THE SETTING SUN: IMMIGRATION POLICY, RACE RELATIONS AND MULTICULTURALISM IN POST- COLONIAL GREAT BRITAIN FLORA MACIVOR LAMOUREUX UNDER THE DIRECTION OF PROFESSOR GILLES LEYDIER ii TABLE OF CONTENTS INTRODUCTION ............................................................................................................ 1 THE FIRST BRITISH ASIANS: A HISTORY .............................................................. 8 I. The Colonial
    [Show full text]
  • The Representation of Extremists in Western Media
    2015 The Representation of Extremists in Western Media As radicalised Muslim converts gain ever greater attention within the War on Terror (WoT) and the media, an investigation into their portrayal and the associated discourses becomes ever more relevant. This study aims to shed more light on the representation of these extremist individuals in the Western media, specifically white converts to Islam who become radicalised. It explores whether there is indeed a difference between the portrayal of female and male extremists within this context and seeks to reveal any related social or national anxieties. This research paper has a qualitative research design, comprising the comparative case study model and discourse analysis. The main sources for the discourse analysis are English-speaking Western newspapers. Laura Kapelari Supervisor: Jacqueline De Matos Ala A research report submitted in partial fulfilment of the requirements for the degree of Master of Arts in International Relations University of the Witwatersrand 2015 Declaration I declare that this research report is my own unaided work except where I have explicitly indicated otherwise. This research report is submitted towards the degree of Master of Arts in International Relations by coursework and research report at the University of the Witwatersrand, Johannesburg. It has not been submitted before for any other degree or examination at any other university. _____________________________ Laura Kapelari 1 Table of Contents Declaration ...................................................................................................................................
    [Show full text]
  • Stepford Four” Operation: How the 2005 London Bombings Turned E
    The 7/7 London Bombings and MI5’s “Stepford Four” Operation: How the 2005 London Bombings Turned every Muslim into a “Terror Suspect” By Karin Brothers Global Research, May 26, 2017 Global Research This article first published on July 12, 2014 provides a historical understanding of the wave of Islamophobia sweeping across the United Kingdom since 7/7. This article is of particular relevance in understanding the May 2017 Manchester bombing and its tragic aftermath. (M. Ch. GR Editor) Nine Years Ago, the 7/7 London Bombing This article is dedicated to former South Yorkshire terror analyst Tony Farrell who lost his job but kept his integrity, and with thanks to the documentation provided by the July 7th Truth Campaign “:One intriguing aspect of the London Bombing report is the fact that the MI5 codename for the event is “Stepford”. The four “bombers” are referred to as the “Stepford four”. Why is this the case? … the MI5 codename is very revealing in that it suggests the operation was a carefully coordinated and controlled one with four compliant and malleable patsies following direct orders. Now if MI5 has no idea who was behind the operation or whether there were any orders coming from a mastermind, why would they give the event the codename “Stepford”? ” (Steve Watson, January 30, 2006 Prison Planet) Background The word was out that there was easy money to be made by Muslims taking part in an emergency- preparedness operation. Mohammad Sidique Khan — better known by his western nickname “Sid” — had been approached by his contact, probably Haroon Rashid Aswat who was in town, about a big emergency preparedness operation that was looking for local Pakistanis who might take the part of pretend “suicide bombers” for the enactment.
    [Show full text]
  • One Year Later, Video Shows Warning by a London Bomber -
    One Year Later, Video Shows Warning by a London Bomber - ... http://www.nytimes.com/2006/07/07/world/europe/07britain.htm... July 7, 2006 One Year Later, Video Shows Warning by a London Bomber By ALAN COWELL LONDON, July 6 — On the day before the first anniversary of the London bombings, Al Jazeera television showed a video on Thursday that appeared to be a last testament recorded in advance by one of the four attackers warning that, "What you have witnessed now is only the beginning." The broadcast included separate scenes of Ayman al-Zawahiri, the No. 2 leader of Al Qaeda, suggesting that the group was seeking to take responsibility for or at least to associate itself with the attacks. When that was recorded was unclear. The bomber, Shehzad Tanweer, 22, appeared in a red-and-white checked headdress against a backdrop that seemed strikingly reminiscent of a setting used in a video broadcast last September of a man identified as Mohammad Sidique Khan, who is suspected of being the ringleader of the attacks. On that video, Mr. Khan, 30, declared, "We are at war, and I am a soldier." The four bombers killed themselves and 52 victims in attacks on three subway trains and a bus on July 7, 2005. The attacks stunned Britons in part because they had been planned and carried out largely by British-born Muslims drawn to militant Islam. A report by Parliament in May said that Mr. Khan and Mr. Tanweer had visited Pakistan before the attacks, and, while there, might have contacted Qaeda figures and trained to use explosives.
    [Show full text]
  • 'War on Terror'. a Study of Attribution in Elite Newspaper Coverage
    Sourcing and Framing the 'War on Terror'. A Study of Attribution in Elite Newspaper Coverage. Morgan Stack (B.Sc M.Acc MBS) Supervisor: Dr. Kevin Rafter School of Communications Dublin City University A thesis submitted to Dublin City University in candidacy for the degree of Doctor of Philosophy. PhD June 2013 DECLARATION I hereby certify that this material, which I now submit for assessment on the programme of study leading to the award of Doctor of Philosophy , is entirely my own work, that I have exercised reasonable care to ensure that the work is original, and does not to the best of my knowledge breach any law of copyright, and has not been taken from the work of others save and to the extent that such work has been cited and acknowledged within the text of my work. Signed: ____________________ (Candidate) ID No.: 59110937 Date:_______________________ 2 ABSTRACT The 'war on terror', described as the most important framing case of our time, is analysed in this study of elite newspaper coverage primarily in terms of the 'attribution of responsibility' for specific terrorist attacks. This is justified by the role of attribution in terms of 'primary definition', the exertion of political power in the text, and the constitutive role of attribution in public opinion formation. In addition to an analysis of how the coverage 'framed' attribution, the study also attempts to speak to the validity or otherwise of the 'mythical metanarrative' interpretation of the 'war on terror'. The study proceeds to analyse the nature of news sources drawn upon in the coverage, most specifically again with respect to the construction of attribution.
    [Show full text]
  • Returning Western Foreign Fighters: the Case of Afghanistan, Bosnia and Somalia
    Returning Western foreign fighters: The case of Afghanistan, Bosnia and Somalia Jeanine de Roy van Zuijdewijn and Edwin Bakker ICCT Background Note June 2014 Authorities are increasingly worried about the large number of Western foreign fighters present in Syria. The fear is that these fighters will return radicalised, battle hardened and with extensive radical networks that might encourage them to commit a terrorist attack in the home country. The recent attack on the Jewish Museum in Brussels – allegedly by a returned foreign fighter from Syria – seems to be a case in point. However, the conflict in Syria is not the first to attract foreign fighters. In this Background Note, Jeanine de Roy van Zuijdewijn and Edwin Bakker investigate three historical cases of foreign fighting: Afghanistan (1980s), Bosnia (1990s) and Somalia (2000s). In this paper they aim to give insight into what happened to these foreign fighters after their fight abroad had ended. The authors distinguish eight possible pathways for foreign fighters that can help to contribute to a more nuanced understanding of this complex phenomenon. About the Authors Jeanine de Roy van Zuijdewijn is Research Assistant at the Centre for Terrorism and Counterterrorism (CTC) in The Hague. She holds a master’s degree in International Relations in Historical Perspective (cum laude) from Utrecht University, which she completed with a thesis on foreign fighters. Currently, she is working on the development of MOOCs – massive open online courses – at Leiden University. In that position, she assisted Professor Bakker with the MOOC Terrorism and Counterterrorism: Comparing Theory & Practice that attracted more than 40,000 students.
    [Show full text]
  • For Caliph and Country Exploring How British Jihadis Join a Global Movement
    For Caliph and Country Exploring how British jihadis join a global movement RACHEL BRYSON 1 2 Contents Executive Summary 5 Policy Recommendations 9 Findings British Jihadis in a Global Network 13 Trends Among British Jihadis 23 Appendix Methodology 34 Note Research for this report was conducted in November and December 2016 and then subsequently analysed. 3 4 1.0 Executive Summary This report explores what connects jihadis from across the UK and how they made their journey into jihadism. For more than 30 years, British jihadis have been fighting under the banner of an extreme Islamist ideology in conflicts from Algeria to the Philippines. For half of that time, the streets of the UK have been seen as a legitimate target, as witnessed most recently in both London and Manchester. Ideologues made their home in Britain, having been rejected from Muslim-majority countries because the ideas they expounded were considered dangerous. From the UK, they influenced many. In the last five years, the conflict in Syria alone has attracted over 800 British fighters.1 1 “Who are Britain’s Jihadists?”, BBC News, 10 October 2016. www. bbc.co.uk/news/uk-32026985. 55 Their ideology justifies the use of violent jihad to Our sample was diverse – from the very wealthy achieve its aims. Its proponents believe in imposing to the very poor; those raised in Muslim households to their interpretation of Islam on others as state law, with converts; ‘straight-laced,’ straight-A students, to drug no tolerance for alternatives. They believe in brutally dealers – but there were some significant trends that punishing apostates and subjugating women.
    [Show full text]
  • Department of Political Science [email protected]
    Getting Organized: A Pragmatic Tool for Writing Papers BY Patricia M. Shields Department of Political Science Southwest Texas State University Presented at the International Consortium for Educational Development in Higher Education, April 19-22,1998 Austin, Texas. For further information contact Pat Shields, Director, Masters of Public Administration Program, Southwest Texas State University, San Marcos, TX 512-245-2143 [email protected]. Getting Organized: A Pragmatic Tool for Writing Papers Patricia M, Shields Department of Political Science Southwest Texas State University This paper describes a method for writing formal research papers. The technique, known and the "Notebook Method" has been applied successfully by graduate students, faculty and students in continuing education programs. The Notebwk Method's success is measured in publications, award winning student papers1,graduation rates and dollars. For example, after The Bill Blackwood Law Enforcement Management Institute of Texas, Graduate Management Institute, Sam Houston State University began applying this technique their paper completion rate went from 32 in 1995 to 88 in 1996. Before implementation of the Notebook Method, the institute spent approximately $250,000 a year on the research component of their program. After instituting this method, the cost dropped to about $45,000 per year.* One key to the notebook's success is its focus on organization. The technique is also powerful because it is grounded in "Pragmatism"as a philosophy of inquiry. Much of this paper is devoted to developing the link to pragmatism. A Little History: Defining the Problem Every Southwest Texas Masters of Public Administration (MPA) student is required to complete an Applied Research Project (ARP).
    [Show full text]
  • Xerox University Microfilms 300 North Zeeb Road Ann Arbor, Michigan 48108 74-3108
    INFORMATION TO USERS This material was produced from a microfilm copy of the original document. While the most advanced technological means to photograph and reproduce this document have been used, the quality is heavily dependent upon the quality of the original submitted. The following explanation of techniques is provided to help you understand markings or patterns which may appear on this reproduction. 1. The sign or "target" for pages apparently lacking from the document photographed is "Missing Page{s)". If it was possible to obtain the missing page(s) or section, they are spliced into the film along with adjacent pages. This may have necessitated cutting thru an image and duplicating adjacent pages to insure you complete continuity. 2. When an image on the film is obliterated with a large round black mark, it is an indication that the photographer suspected that the copy may have moved during exposure and thus cause a blurred image. You will find a good image of the page in the adjacent frame. 3. When a map, drawing or chart, etc., was part of the material being photographed the photographer followed a definite method in "sectioning" the material. It is customary to begin photoing at the upper left hand corner of a large sheet and to continue photoing from left to right in equal sections with a small overlap. If necessary, sectioning is continued again — beginning below the first row and continuing on until complete. 4. The majority of users indicate that the textual content is of greatest value, however, a somewhat higher quality reproduction could be made from "photographs" if essential to the understanding of the dissertation.
    [Show full text]
  • CTC Sentinel 3:8 27 U.S.A
    AUGUST 2010 . VOL 3 . ISSUE 8 COMBATING TERRORISM CENTER AT WEST POINT CTC Sentinel OBJECTIVE . RELEVANT . RIGOROUS Contents Evaluating the Al-Qa`ida FEATURE ARTICLE 1 Evaluating the Al-Qa`ida Threat to Threat to the U.S. Homeland the U.S. Homeland By Philip Mudd By Philip Mudd REPORTS 4 The Growing Danger from Radical Islamist Groups in the United States By Paul Cruickshank 10 Manchester, New York and Oslo: Three Centrally Directed Al-Qa`ida Plots By Raffaello Pantucci 13 Lessons Learned from the July 2010 Norwegian Terrorist Plot By Petter Nesser and Brynjar Lia 17 American Journeys to Jihad: U.S. Extremists and Foreign Conflicts During the 1980s and 1990s By William Rosenau and Sara Daly 20 Tensions Rise Between Hizb-i-Islami and the Taliban in Afghanistan By Matthew DuPee and Anand Gopal 24 Recent Highlights in Terrorist Activity 28 CTC Sentinel Staff & Contacts n the nine years since the terrorist however, many of the recent terrorist attacks of September 11, 2001, plotters are U.S.-born Muslims or the counterterrorism campaign converts, with few, if any, links to al- in the United States has changed Qa`ida’s central leadership. Al-Qa`ida’s Iremarkably. In the initial years after revolutionary message, starting with the 9/11, the primary counterterrorism group’s inception more than two decades concern was the presence of more al- ago and manifest in its 1998 fatwa against Qa`ida-directed terrorists on U.S. soil. the United States, has clearly reached Focus was concentrated on preventing U.S. shores. Although al-Qa`ida is About the CTC Sentinel a weapon of mass destruction strike, a often viewed strictly operationally, The Combating Terrorism Center is an second coordinated mass transit attack, its use of terrorism is only a tactic independent educational and research or a cell directed against a different and the group’s primary mission is to institution based in the Department of Social infrastructure target.
    [Show full text]