Assessing the Terrorist Threat
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Combating Islamic Extremist Terrorism 1
CGT 1/22/07 11:30 AM Page 1 Combating Islamic Extremist Terrorism 1 OVERALL GRADE D+ Al-Qaeda headquarters C+ Al-Qaeda affiliated groups C– Al-Qaeda seeded groups D+ Al-Qaeda inspired groups D Sympathizers D– 1 CGT 1/22/07 11:30 AM Page 2 2 COMBATING ISLAMIC EXTREMIST TERRORISM ive years after the September 11 attacks, is the United States win- ning or losing the global “war on terror”? Depending on the prism through which one views the conflict or the metrics used Fto gauge success, the answers to the question are starkly different. The fact that the American homeland has not suffered another attack since 9/11 certainly amounts to a major achievement. U.S. military and security forces have dealt al-Qaeda a severe blow, cap- turing or killing roughly three-quarters of its pre-9/11 leadership and denying the terrorist group uncontested sanctuary in Afghanistan. The United States and its allies have also thwarted numerous terror- ist plots around the world—most recently a plan by British Muslims to simultaneously blow up as many as ten jetliners bound for major American cities. Now adjust the prism. To date, al-Qaeda’s top leaders have sur- vived the superpower’s most punishing blows, adding to the near- mythical status they enjoy among Islamic extremists. The terrorism they inspire has continued apace in a deadly cadence of attacks, from Bali and Istanbul to Madrid, London, and Mumbai. Even discount- ing the violence in Iraq and Afghanistan, the tempo of terrorist attacks—the coin of the realm in the jihadi enterprise—is actually greater today than before 9/11. -
Terrorism Opinion Piece
THE EVOLVING NATURE OF TERRORISM--------NINE YEARS AFTER THE 9/11 ATTACKS Committee on Homeland Security U.S. House of Representatives 15 September 2010 Written Testimony Submitted by Professor Bruce Hoffman School of Foreign Service, Georgetown University - 2 - Several disquieting trends converged in New York City’s fabled Times Square entertainment district on Saturday evening, May 1st, 2010.1 First, a foreign terrorist group, with a hitherto local agenda and otherwise parochial aims, once more stretched its wings and sought to operate on a broader, more ambitious global canvas. Second, the conventional wisdom, which has long held that the threat to the U.S. was primarily external; involving foreigners coming from overseas to kill Americans in this country as had occurred on September 11th 2001, was once again shattered. Third, the belief that the American ‘‘ melting pot’’ --------our historical capacity to readily absorb new immigrants--------would provide a ‘‘ fire-wall’’ against radicalization and recruitment has fallen by the wayside. Finally, al- Qaeda and its allies have embraced a strategy of attrition that is deliberately designed to overwhelm, distract and exhaust its adversaries. Thus, the Times Square incident, despite initial claims to the contrary, was not a ‘‘ one off’’ event perpetrated by an individual variously described as ‘‘ isolated’’ or a ‘‘ lone wolf’’ but rather is part of an emerging pattern of terrorism that directly threatens the U.S. and presents new and even more formidable challenges to our national security.2 LOCAL GROUPS WITH NEW GLOBAL AMBITIONS IN ALLIANCE WITH OLD ENEMIES This was precisely the message that Faisal Shahzad sought to convey when he appeared before a New York Federal District Court in June 2010. -
Intelligence Security Law Enforcement
The Methods and Value of Behavioral Detection in Retail Michael Rozin, Doug Reynolds, Eric White MR The Threat is Real NY, USA Moscow, Russia Madrid, Spain London, UK Mumbai, India Terrorist Threat Adam Gadahn: 1. Simple Attacks. “ The fact is, the heroic Fort Hood operation opens up a host of new opportunities…“ 2. Act Individually “ We must look to further undermine the West's already-struggling economies with carefully timed-and-targeted attacks on symbols of capitalism which will again shake consumer confidence and stifle spending aspects of the Western Crusader culture….” 3. Don’t Travel Overseas “ And Brother Nidal didn't unnecessarily raise his security profile or waste money better spent on the operation itself by traveling abroad to acquire skills and instructions which could easily be acquired at home, or indeed, deduced by using one's own powers of logic and reasoning…. 4. Choose “Easy” Targets Terrorism Threat in USA • May 20, 2009 - Four Muslim converts were arrested in New York for plotting to bomb two Jewish synagogues and shoot down a military aircraft. The suspects were James Cromitie, David Williams, Onta Williams and Laguerre Payen. • June 1, 2009 – Carlos Bledsoe aka., “Abdul Muhammad” carried out a deadly shooting at a recruiting station in Little Rock, Arkansas. One soldier was killed and one was injured. • July 28, 2009 – The FBI arrested seven men in North Carolina as a part of a terrorist conspiracy to wage an Islamic holy war overseas. All seven had received paramilitary training within the US. • September 19, 2009 – Authorities arrested Najibullah Zazi on terrorism charges. -
Across the Universe? a Comparative Analysis of Violent Behavior And
The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Across the Universe? A Comparative Analysis of Violent Behavior and Radicalization Across Three Offender Types with Implications for Criminal Justice Training and Education Author(s): John G. Horgan, Ph.D., Paul Gill, Ph.D., Noemie Bouhana, Ph.D., James Silver, J.D., Ph.D., Emily Corner, MSc. Document No.: 249937 Date Received: June 2016 Award Number: 2013-ZA-BX-0002 This report has not been published by the U.S. Department of Justice. To provide better customer service, NCJRS has made this federally funded grant report available electronically. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. Across the Universe? A Comparative Analysis of Violent Behavior and Radicalization Across Three Offender Types with Implications for Criminal Justice Training and Education Final Report John G. Horgan, PhD Georgia State University Paul Gill, PhD University College, London Noemie Bouhana, PhD University College, London James Silver, JD, PhD Worcester State University Emily Corner, MSc University College, London This project was supported by Award No. 2013-ZA-BX-0002, awarded by the National Institute of Justice, Office of Justice Programs, U.S. Department of Justice. The opinions, findings, and conclusions or recommendations expressed in this publication are those of the authors and do not necessarily reflect those of the Department of Justice 1 ABOUT THE REPORT ABOUT THE PROJECT The content of this report was produced by John Horgan (Principal Investigator (PI)), Paul Gill (Co-PI), James Silver (Project Manager), Noemie Bouhana (Co- Investigator), and Emily Corner (Research Assistant). -
The Internet and the Radicalization of Muslim Women
The Internet and the Radicalization of Muslim Women Sergio E. Sanchez California State University, Chico Department of Political Science Chico, CA 95929 [email protected] “to kill one and frighten 10,000 others” - Chinese Proverb Paper prepared for Presentation at the annual meeting of the Western Political Science Association, Seattle, WA, April 2014. Abstract The Internet, with its built in anonymity and continuous availability – 24 hours a day, seven days a week- is for some the perfect venue for chatting, meeting new people, learning about topics of interest, and a source for countless hours of entertainment. Moreover, the Internet allows individuals from all over the country, or the world, who are from different socioeconomic backgrounds but who share similar interests and ideologies to interact and communicate privately. However, the Internet is also a readymade platform for the spread of hate, terror, and other radical ideas and messages, all of which can be transmitted at the speed of light, anonymously, and available on demand. The Internet is, therefore, an ideal venue for women to interact with likeminded individuals or organizations without having to sacrifice or tarnish their standing in the community or among their families. Women from repressive countries such as Saudi Arabia, Egypt, and Palestine can participate in jihad without leaving their homes and without having to meet strange men face-to-face and, consequently, bring shame to their families or themselves – as per traditional Islamic practices. Likewise, women involved or interested in radical environmentalism can meet online, share ideas, and continue their struggle against governments and corporations. Similarly, women involved, or fascinated with, right-wing religious movements or hate groups such as the KKK or neo-Nazis can likewise meet in a private setting, virtually, with little concern that their reputations or image within the community will be tarnished by their surreptitious activities online. -
Central Intelligence Agency (CIA) Freedom of Information Act (FOIA) Case Log October 2000 - April 2002
Description of document: Central Intelligence Agency (CIA) Freedom of Information Act (FOIA) Case Log October 2000 - April 2002 Requested date: 2002 Release date: 2003 Posted date: 08-February-2021 Source of document: Information and Privacy Coordinator Central Intelligence Agency Washington, DC 20505 Fax: 703-613-3007 Filing a FOIA Records Request Online The governmentattic.org web site (“the site”) is a First Amendment free speech web site and is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. 1 O ct 2000_30 April 2002 Creation Date Requester Last Name Case Subject 36802.28679 STRANEY TECHNOLOGICAL GROWTH OF INDIA; HONG KONG; CHINA AND WTO 36802.2992 CRAWFORD EIGHT DIFFERENT REQUESTS FOR REPORTS REGARDING CIA EMPLOYEES OR AGENTS 36802.43927 MONTAN EDWARD GRADY PARTIN 36802.44378 TAVAKOLI-NOURI STEPHEN FLACK GUNTHER 36810.54721 BISHOP SCIENCE OF IDENTITY FOUNDATION 36810.55028 KHEMANEY TI LEAF PRODUCTIONS, LTD. -
Framing 'Jihadjane'
What’s Love Got To Do With It? Framing ‘JihadJane’ in the US Press Maura Conway Dublin City University, Ireland Lisa McInerney University of Limerick, Ireland Abstract The purpose of this article is to compare and contrast the US press coverage accorded to female terrorist plotter, Colleen LaRose, with that of two male terrorist plotters in order to test whether assertions in the academic literature regarding media treatment of women terrorists stand up to empirical scrutiny. The authors employed TextSTAT software to generate frequency counts of all words contained in 150 newspaper reports on their three subjects and then slotted relevant terms into categories fitting the commonest female terrorist frames, as identified by Nacos’s article in Studies in Conflict and Terrorism (2005). The authors’ findings confirm that women involved in terrorism receive significantly more press coverage and are framed vastly differently in the US press than their male counterparts. Keywords: female, framing, gender, jihadi, Colleen LaRose, newspapers, press, terrorism, women __________________________________________________________________________________ Introduction This article analyses US press reports on a woman and two men arrested in the US in 2009 and 2010 for their parts in three separate jihadi terrorist plots. The female plotter is widely known as ‘JihadJane’, which was an online pseudonym for Colleen LaRose, an American woman charged with four terrorism-related offences and taken into custody by US law enforcement at Philadelphia International Airport on her return from Europe in October 2009 (Shiffman, 2011).[1] LaRose is accused of using the internet to recruit individuals for the purpose of engaging in violent jihad, to include the murder of Swedish cartoonist Lars Vilks. -
CTC Sentinel 2:1 of Islam Have Committed Another Historic Crime!” 11 There Was Speculation That He Was Trying to Establish (2009)
SEPTEMBER 2009 . VOL 2 . ISSUE 9 COMBATING TERRORISM CENTER AT WEST POINT CTC Sentinel OBJECTIVE . RELEVANT . RIGOROUS Contents Are the Afghan Taliban Involved FEATURE ARTICLE in International Terrorism? 1 Are the Afghan Taliban Involved in By Anne Stenersen International Terrorism? By Anne Stenersen REPORTS 5 The Insurgent-Narcotic Nexus in Helmand Province By Captain Michael Erwin, U.S. Army 8 The Expansion Strategy of Al-Qa`ida in the Arabian Peninsula By Gregory D. Johnsen 11 A Profile of Pakistan’s Lashkar-i-Jhangvi By Arif Jamal 14 The Failure of Salafi-Jihadi Insurgent Movements in the Levant By Bilal Y. Saab 18 The Dangerous Ideas of the Neo-Zarqawist Movement By Murad Batal al-Shishani 20 The July 17 Jakarta Suicide Attacks and the Death of Noordin Top By Noor Huda Ismail Afghan Taliban walk through a bazaar in Quetta, Pakistan in 2005. - Photo by Robert Nickelsberg/Getty Images n a video aired on ABC News frequently use “al-Qa`ida-style” anti- 22 Recent Highlights in Terrorist Activity in June 2007, Afghan Taliban Western rhetoric, and insurgents have 24 CTC Sentinel Staff & Contacts commander Mansour Dadullah endorsed suicide bombing as a tactic—a is shown speaking to a group of phenomenon previously unknown in Iaround 300 masked men. The men are Afghanistan. Moreover, the Afghan presented as “suicide bombers” about to Taliban’s most immediate enemies are go on missions in Western countries, in the United States and its allies, who particular to the United States, Canada, they claim have occupied their country the United Kingdom and Germany.1 since 2001. -
Preventing Violent Extremism in Kyrgyzstan
UNITED STATES INSTITUTE OF PEACE www.usip.org SPECIAL REPORT 2301 Constitution Ave., NW • Washington, DC 20037 • 202.457.1700 • fax 202.429.6063 ABOUT THE REPORT Jacob Zenn and Kathleen Kuehnast This report offers perspectives on the national and regional dynamics of violent extremism with respect to Kyrgyzstan. Derived from a study supported by the United States Institute of Peace (USIP) to explore the potential for violent extremism in Central Asia, it is based on extensive interviews and a Preventing Violent countrywide Peace Game with university students at Kyrgyz National University in June 2014. Extremism in Kyrgyzstan ABOUT THE AUTHORS Jacob Zenn is an analyst on Eurasian and African affairs, a legal adviser on international law and best practices related to civil society and freedom of association, and a nonresident research Summary fellow at the Center of Shanghai Cooperation Organization Studies in China, the Center of Security Programs in Kazakhstan, • Kyrgyzstan, having twice overthrown autocratic leaders in violent uprisings, in 2005 and again and The Jamestown Foundation in Washington, DC. Dr. Kathleen in 2010, is the most politically open and democratic country in Central Asia. Kuehnast is a sociocultural anthropologist and an expert on • Many Kyrgyz observers remain concerned about the country’s future. They fear that underlying Kyrgyzstan, where she conducted field work in the early 1990s. An adviser on the Central Asia Fellows Program at the socioeconomic conditions and lack of public services—combined with other factors, such as Elliott School of International Affairs at George Washington drug trafficking from Afghanistan, political manipulation, regional instability in former Soviet University, she is a member of the Council on Foreign Union countries and Afghanistan, and foreign-imported religious ideologies—create an envi- Relations and has directed the Center for Gender and ronment in which violent extremism can flourish. -
CTC Sentinel Objective
SEPTEMBER 2009 . VOL 2 . ISSUE 9 COMBATING TERRORISM CENTER AT WEST POINT CTC Sentinel OBJECTIVE . RELEVANT . RIGOROUS Contents Are the Afghan Taliban Involved FEATURE ARTICLE in International Terrorism? 1 Are the Afghan Taliban Involved in By Anne Stenersen International Terrorism? By Anne Stenersen REPORTS 5 The Insurgent-Narcotic Nexus in Helmand Province By Captain Michael Erwin, U.S. Army 8 The Expansion Strategy of Al-Qa`ida in the Arabian Peninsula By Gregory D. Johnsen 11 A Profile of Pakistan’s Lashkar-i-Jhangvi By Arif Jamal 14 The Failure of Salafi-Jihadi Insurgent Movements in the Levant By Bilal Y. Saab 18 The Dangerous Ideas of the Neo-Zarqawist Movement By Murad Batal al-Shishani 20 The July 17 Jakarta Suicide Attacks and the Death of Noordin Top By Noor Huda Ismail Afghan Taliban walk through a bazaar in Quetta, Pakistan in 2005. - Photo by Robert Nickelsberg/Getty Images n a video aired on ABC News frequently use “al-Qa`ida-style” anti- 22 Recent Highlights in Terrorist Activity in June 2007, Afghan Taliban Western rhetoric, and insurgents have 24 CTC Sentinel Staff & Contacts commander Mansour Dadullah endorsed suicide bombing as a tactic—a is shown speaking to a group of phenomenon previously unknown in Iaround 300 masked men. The men are Afghanistan. Moreover, the Afghan presented as “suicide bombers” about to Taliban’s most immediate enemies are go on missions in Western countries, in the United States and its allies, who particular to the United States, Canada, they claim have occupied their country the United Kingdom and Germany.1 since 2001. -
30 Terrorist Plots Foiled: How the System Worked Jena Baker Mcneill, James Jay Carafano, Ph.D., and Jessica Zuckerman
No. 2405 April 29, 2010 30 Terrorist Plots Foiled: How the System Worked Jena Baker McNeill, James Jay Carafano, Ph.D., and Jessica Zuckerman Abstract: In 2009 alone, U.S. authorities foiled at least six terrorist plots against the United States. Since Septem- ber 11, 2001, at least 30 planned terrorist attacks have Talking Points been foiled, all but two of them prevented by law enforce- • At least 30 terrorist plots against the United ment. The two notable exceptions are the passengers and States have been foiled since 9/11. It is clear flight attendants who subdued the “shoe bomber” in 2001 that terrorists continue to wage war against and the “underwear bomber” on Christmas Day in 2009. America. Bottom line: The system has generally worked well. But • President Obama spent his first year and a half many tools necessary for ferreting out conspiracies and in office dismantling many of the counterter- catching terrorists are under attack. Chief among them are rorism tools that have kept Americans safer, key provisions of the PATRIOT Act that are set to expire at including his decision to prosecute foreign ter- the end of this year. It is time for President Obama to dem- rorists in U.S. civilian courts, dismantlement of onstrate his commitment to keeping the country safe. Her- the CIA’s interrogation abilities, lackadaisical itage Foundation national security experts provide a road support for the PATRIOT Act, and an attempt map for a successful counterterrorism strategy. to shut down Guantanamo Bay. • The counterterrorism system that has worked successfully in the past must be pre- served in order for the nation to be successful In 2009, at least six planned terrorist plots against in fighting terrorists in the future. -
9-11 and Terrorist Travel- Full
AND TERRORIST TRAVEL Staff Report of the National Commission on Terrorist Attacks Upon the United States 9/11 AND TERRORIST TRAVEL Staff Report of the National Commission on Terrorist Attacks Upon the United States By Thomas R. Eldridge Susan Ginsburg Walter T. Hempel II Janice L. Kephart Kelly Moore and Joanne M. Accolla, Staff Assistant Alice Falk, Editor Note from the Executive Director The Commission staff organized its work around specialized studies, or monographs, prepared by each of the teams. We used some of the evolving draft material for these studies in preparing the seventeen staff statements delivered in conjunction with the Commission’s 2004 public hearings. We used more of this material in preparing draft sections of the Commission’s final report. Some of the specialized staff work, while not appropriate for inclusion in the report, nonetheless offered substantial information or analysis that was not well represented in the Commission’s report. In a few cases this supplemental work could be prepared to a publishable standard, either in an unclassified or classified form, before the Commission expired. This study is on immigration, border security and terrorist travel issues. It was prepared principally by Thomas Eldridge, Susan Ginsburg, Walter T. Hempel II, Janice Kephart, and Kelly Moore, with assistance from Joanne Accolla, and editing assistance from Alice Falk. As in all staff studies, they often relied on work done by their colleagues. This is a study by Commission staff. While the Commissioners have been briefed on the work and have had the opportunity to review earlier drafts of some of this work, they have not approved this text and it does not necessarily reflect their views.