Use of the Internet for Counter-Terrorist Purposes Liat Shetret

Total Page:16

File Type:pdf, Size:1020Kb

Use of the Internet for Counter-Terrorist Purposes Liat Shetret POLICY BRIEF February 2011 Use of the Internet for Counter-Terrorist Purposes Liat Shetret Introduction terrorist purposes. It argues that the Internet is not the problem and that the online platform On 1 May 2010, Faisal Shahzad, a naturalized can be employed to counter terrorism efforts. U.S. citizen, tried to detonate a car bomb in the Specifically, models of violent radicalization heart of New York’s Times Square. Thanks to processes off-line offer an important and useful “…the internet the vigilance of local witnesses and to technical framework for the development and remains largely shortcomin gs, the bomb was detected and implementation of policies to counter online unregulated or failed to explode. The investigation 6 use of the Internet for terrorist purposes. un-mediated… surroundin g Shahzad’s case, like other, more recent cases,1 shows that the Internet played an The brief concludes by offering multilateral stakeholders important role in his violent radicalization and institutions, states, civil society organizations, should not shy the planning and execution of the attempted the media, and the private sector examples of away from using attack. For example, he drew spiritual how they can use the Internet more effectively it as yet another inspiration from lectures and videos circulated as a counterterrorism tool to prevent and tool in the online by Anwar al-Awlaki, a U.S.-Yemeni counter the use of the Internet for violent counterterrorism cleric, who helped to convince Shahzad to take radicalization. Four intervention points are toolbox.” up the cause of al-Qaida.2 Shahzad accessed suggested: (1) weaken cult personalities, (2) Web sites for operational and planning challenge the extremist doctrine, (3) dispel the purposes. He viewed “real-time video feeds of glory of the “terrorist lifestyle,” and (4) offer a different areas of Times Square” to help street-smart and locally developed and determine which areas attract a large crowd communicated counternarrative. and would result in a high casualty rate if attacked.3 Shahzad also used the Internet to Background discuss his plans with militants based in Pakistan.4 The Internet is a medium that facilitates the maintenance of a decentralized, global, violent Terrorist operatives such as Shahzad often extremist movement. It provides a virtual draw inspiration, reinforcement, support, and forum for those who wish to propagate violent g uidance from a variety of on- and off-line ideologies and influence audiences around the sources. Some clerics; experts; scholars, such as world in real time.7 As Brynjar Lia, a research al-Awlaki; and virtual communities use the professor at the Norwegian Defence Research Internet to promote violent extremism on their Establishment, noted, the Internet is “an blogs, social network pages, discussion forums, important contributing factor in making or through the streaming of videos on terrorism more global and more transnational multimedia platforms such as YouTube.5 This in scope” and assists in the creation and brief provides an overview of challenges posed preservation of social bonds among leaders, to stakeholders by the use of the Internet for supporters, and sympathizers.8 Marc Sageman Building stronger partnerships to prevent terrorism www.globalct.org POLICY BRIEF suggested that Internet communication serves are difficult to monitor or remove, assure as a “glue” to an otherwise “leaderless jihad.”9 continuity of ideas and information flow, and Indeed, the Internet offers an ideal platform facilitate interactive and dynamic discussions.15 for media-minded terrorists to stimulate and supplement violent extremist activity off-line Recruitment and radicalization are facilitated in the “real world.” Terrorists acutely aware of through strategic online communications and these strengths are actively capitalizing on the messaging consumed by local and global advantages offered by online and off-line audiences. There remains considerable debate platforms. regarding to what extent activities on the Internet are complemented by physical The Internet can be exploited for terrorist relationships. Although most recruitment is purposes in numerous ways. It can be used for believed to be rooted in off-line relationships information gathering, fundraising, and data and experiences in the real world, the Internet mining, as well as for reconnaissance purposes supplements and may replace traditional Liat Shetret is a programs 10 officer at the Center on for potential attacks. The Internet also is used physical gathering spaces such as mosques, Global Counterterrorism to attract attention to a particular cause or community centers, and coffee shops as Cooperation. The author 16 wishes to thank her grievance, to communicate and coordinate recruitment venues. Moreover, individuals’ colleagues at the Center— operations secretly, and to exchange instructive ability to self-select themselves in to specific Alistair Millar, James technical tradecraft manuals and guides.11 In Web sites or chatrooms hardens and reinforces Cockayne, and Jason Ipe— for their valuable addition, the Internet is used to set agendas particular worldviews and can facilitate the comments and critique. and disseminate repackaged information (or creation of an “alternative reality” and value Thank you to Jack Barclay, 17 independent consultant on disinformation) as well as propaganda systems. Individuals continually choose to strateg ic communications, materials that draw on religious texts for return to specific sources of information for his insight, and legitimacy and validity. These materials are repeatedly. Over time, propaganda materials, feedback. produced, authenticated, and distributed by videos, books, poetry, articles, music, and affiliated media wings.12 manuals assure potential recruits of the “righteousness of both the cause and the means The Internet also can be exploited as a adopted” and further legitimize and justify the communicative tool via Web sites, chatrooms, use of violence.18 instant messaging, and social networking platforms to exchange ideas, share Challenges Facing Stakeholders information, and strengthen a sense of Combating the Use of the Internet community and personal identity, as well as for Terrorist Purposes reinforce a particular worldview or narrative. For example, over the past few years there has Multilateral institutions, regional been an increase in the number of Web sites, organizations, states, civil society, and other podcasts, blogs, and social networking pages stakeholders have been grappling with the catering to al-Qaida’s sympathizer community problem of the Internet being used to recruit by calling for the use of violence.13 These and violently radicalize individuals across the messages often are tailored to exploit globe.19 Despite some important positive steps vulnerable populations such as youth and in this area, a number of challenges remain. linguistically are tailored specifically for Western audiences to encourage ideological First, policies and programming have largely buy-in.14 It has been suggested that interactive focused on technology-oriented approaches forums and chatrooms are important, often such as removing and banning Web sites.20 It is critical “nodes” for communication, as they important to distinguish between technological 2 © Center on Global Counterterrorism Cooperation Use of the Internet for Counter-Terrorist Purposes Liat Shetret and technical solutions to cybercrime (attacks According to the United States Institute of on physical systems and infrastructure) and a Peace, “Fragmented efforts of public social phenomenon such as communicative diplomacy, strategic communications and uses of the Internet described in this brief. information operations are underresourced, Applying technological Band-Aids to social poorly coordinated, and understaffed given the concerns naturally limits the positive and strength and pervasiveness of [al-Qaida’s] 26 long-term impact banning and censoring message.” Indeed, media-savvy terrorist mechanisms produce.21 Although policing organizations are good at what they do. Web sites and content may be of some use, Nimble media wings are capitalizing these mechanisms fail to counter the message effectively on the Internet’s advantages, while itself as much of the narrative is not in fact lumbering bureaucracies struggle to balance illegal and does not call overtly for the use of accountability and swift response and are violence.22 Also, technological solutions structurally inflexible. Even though some applicable to our use of the Internet today, for stakeholders have managed to overcome example, to Web sites, chatrooms, and social organizational barriers, they continue to networking platforms, may not apply to struggle with ways to identify and convince technological advances in the future and may reliable messengers to deliver a be a waste of valuable resources. Also, counternarrative, particularly one that is locally censoring and removing information raise relevant, inspiring, and germane to community significant human rights and civil liberty concerns. Stakeholders especially are concerned concerns in practice. about coming up with ways to transmit messages online credibly and effectively Second, the body of literature remains without being dismissed as tainted or underdeveloped on topics such as violent untrustworthy. radicalization, deradicalization, and States and other stakeholders are looking prevention, particularly operational, virtually specifically for practical, financially
Recommended publications
  • Kaunas University of Technology Urban Planning
    KAUNAS UNIVERSITY OF TECHNOLOGY CIVIL ENGINEERING AND ARCHITECTURE FACULTY Ana Petriashvili URBAN PLANNING AND DESIGN FOR TERRORISM RESILIENT CITIES Master degree final project Supervisor Assoc. prof. dr. Irina Matijosaitiene Co-supervisor Johan Jacob Marija De Wachter KAUNAS 2017 1 KAUNAS UNIVERSITY OF TECHNOLOGY CIVIL ENGINEERING AND ARCHITECTURE FACULTY URBAN PLANNING AND DESIGN FOR TERRORISM RESILIENT CITIES Master degree final project Architecture (621K10001) Supervisor Assoc. prof. dr. Irina Matijosaitiene Co-supervisor Johan Jacob Marija De Wachter Reviewer Assoc. prof. dr. Martynas Marozas Project made by Ana Petriashvili KAUNAS 2017 2 ANNOTATION The lack of researches, concentrating on identifying urban features that can be associated with target selection by terrorists, determined thesis overriding question and goal, identify environmental security design elements, as well as spatial urban structures that can possible influence choice of places for terror attacks. To accomplish main goal, some prerequisite goals have been taken into account. Initially, a brief history of terrorism and anti-terrorism design with number of examples and cases have been analyzed and assessed, where some sophisticated security design principles have been highlighted. For humanizing ant-terrorism design elements, crime prevention strategies have been explored, ending with a basic principle of urban and civic design. Second Chapter of a thesis, researches environmental design factors and spatial urban structures that may influence the choice of places for terror attacks. Findings have reviled the chance of terror attack is high when ‘site has a direct access to the main street’; when ‘there are multiple entrances and exits to and from the site’; when ‘site is well-used’; when ‘public and private activities are separated’; when ‘many same functional buildings are redistributed in a surrounding area’; when ‘site has a direct access to the city center’.
    [Show full text]
  • Preventing and Countering Youth Radicalisation in the EU
    DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT C: CITIZENS' RIGHTS AND CONSTITUTIONAL AFFAIRS CIVIL LIBERTIES, JUSTICE AND HOME AFFAIRS Preventing and countering youth radicalisation in the EU STUDY Abstract Upon request by the LIBE Committee, this study focuses on the question of how to best prevent youth radicalisation in the EU. It evaluates counter-radicalisation policies, both in terms of their efficiency and their broader social and political impact. Building on a conception of radicalisation as a process of escalation, it highlights the need to take into account the relation between individuals, groups and state responses. In this light, it forefronts some of the shortcomings of current policies, such as the difficulties of reporting individuals on the grounds of uncertain assessments of danger and the problem of attributing political grievances to ethnic and religious specificities. Finally, the study highlights the ambiguous nature of pro-active administrative practices and exceptional counter-terrorism legislation and their potentially damaging effects in terms of fundamental rights. PE 509.977 EN DOCUMENT REQUESTED BY THE COMMITTEE ON CIVIL LIBERTIES, JUSTICE AND HOME AFFAIRS (LIBE) AUTHORS Professor Didier BIGO (Director, CCLS – Professor at King’s College, United-Kingdom) Dr Laurent BONELLI (Associate researcher, CCLS – Lecturer at the University of Nanterre Paris X, France) Dr Emmanuel-Pierre GUITTET (Associate researcher, CCLS – Lecturer at the University of Manchester, United-Kingdom) Dr Francesco RAGAZZI (Associate researcher, CCLS – Lecturer at the University of Leiden, Netherlands) RESPONSIBLE ADMINISTRATOR Ms Sarah SY Policy Department C - Citizens' Rights and Constitutional Affairs European Parliament B-1047 Brussels E-mail: [email protected] LINGUISTIC VERSIONS Original: EN ABOUT THE EDITOR Policy Departments provide in-house and external expertise to support EP committees and other parliamentary bodies in shaping legislation and exercising democratic scrutiny over EU internal policies.
    [Show full text]
  • CTC Sentinel Welcomes Submissions
    OBJECTIVE ·· RELEVANT ·· RIGOROUS || JUNE/JULYMARCH 2019 2018 · VOLUME · VOLUME 12, 11,ISSUE ISSUE 3 6 FEATURE ARTICLE A VIEW FROM THE CT FOXHOLE A VIEW FROM THE CT FOXHOLE TheHezbollah's Jihadi Threat Procurement Channels LTC(R)Vayl S. Bryan Oxford Price toHow theIndonesia group leverages criminal networks and partners with Iran Director, Former Defense Director, Threat KirstenMatthew E. SchulzeLevitt CombatingReduction Terrorism Agency Center FEATURE ARTICLE 1 Hezbollah's Procurement Channels: Leveraging Criminal Networks and Editor in Chief Partnering with Iran Paul Cruickshank Matthew Levitt Managing Editor INTERVIEW Kristina Hummel 10 A View from the CT Foxhole: Vayl S. Oxford, Director, Defense Threat Reduction Agency EDITORIAL BOARD Kristina Hummel Colonel Suzanne Nielsen, Ph.D. ANALYSIS Department Head Dept. of Social Sciences (West Point) 15 Military Interventions, Jihadi Networks, and Terrorist Entrepreneurs: How the Islamic State Terror Wave Rose So High in Europe Brian Dodwell Petter Nesser Director, CTC 22 The Islamic State's Revitalization in Libya and its Post-2016 War of Attrition Lachlan Wilson and Jason Pack Don Rassler Director of Strategic Initiatives, CTC 32 AQIM Pleads for Relevance in Algeria Geoff D. Porter CONTACT Combating Terrorism Center In our cover article, Matthew Levitt examines Hezbollah’s procurement channels, documenting how the group has been leveraging an internation- U.S. Military Academy al network of companies and brokers, including Hezbollah operatives and 607 Cullum Road, Lincoln Hall criminal
    [Show full text]
  • A Look at the European Union's Challenges Through Romania's
    The European Union at the Crossroads: A Look at the European Union’s Challenges through Romania’s Lenses A Thesis Submitted to the Faculty of Graduate Studies and Research In Partial Fulfillment of the Requirements For the Degree of Master of Arts in Political Science University of Regina By Lidia Vasilica Costa-Muresan Regina, Saskatchewan March 2018 Copyright 2017: L.V. Costa-Muresan UNIVERSITY OF REGINA FACULTY OF GRADUATE STUDIES AND RESEARCH SUPERVISORY AND EXAMINING COMMITTEE Lidia Vasilica Costa-Muresan, candidate for the degree of Master of Arts in Political Science, has presented a thesis titled, The European Union at the Crossroads: A Look at the European Union’s Challenges through Romania’s Lenses, in an oral examination held on December 4, 2017. The following committee members have found the thesis acceptable in form and content, and that the candidate demonstrated satisfactory knowledge of the subject material. External Examiner: Dr. Bruno Dupeyron, Johnson Shoyama Graduate School Supervisor: Dr. Nilgun Onder, Department of Political Science & International Studies Committee Member: Dr. Yuchao Zhu, Department of Political Science & International Studies Committee Member: Dr. Martin Hewson, Department of Political Science & International Studies Chair of Defense: Dr. Harminder Guliani, Department of Economics Abstract “A crisis does not fall from the sky; political crises are not unforeseeable natural catastrophes, which one stands helpless in the face of. They build gradually, accumulating explosive power piece by piece, and then after years of negligence, they are detonated. The heads of state and government behaved nonchalantly as the crisis mounted; they made no attempt to comprehend the dark that gathered over the European pathways.” (Junker, 2005, para.
    [Show full text]
  • Islamophobia As a Form of Governmentality: Unbearable Weightiness of the Politics of Fear
    imer • mim The Willy Brandt Series of Working Papers in International Migration and Ethnic Relations is a forum for research in, and debate about, issues of migration, ethnicity and related topics. It is associated with guest AYHAN KAYA professorship in memory of Willy Brandt. Thus, the Series makes available original manuscripts by the Willy Brandt Guest Professors. The guest professorship in memory of Willy Brandt is a gift to Malmö ISLAMOPHOBIA AS A FORM OF University financed by the City of Malmö, and sponsored by MKB Fastighets AB. The Willy Brandt professorship was established to strengthen GOVERNMENTALITY: and develop research in the field of international migration and ethnic relations, and to create close links to international research in this field. UNBEARABLE WEIGHTINESS OF THE POLITICS OF FEAR The Willy Brandt Series of Working Papers in International Migration and Ethnic Relations is available in print and online. Willy Brandt Series of Working Papers in International Migration and Ethnic Relations 1/11 MALMÖ UNIVERSITY SE-205 06 Malmö M Sweden A tel: +46 40-665 70 00 LM www.mah.se Ö 2011 MALMÖ UNIVERSITY MALMÖ INSTITUTE FOR STUDIES OF MIGRATION, DIVERSITY AND WELFARE (MIM) Willy Brandt Series of Working Papers 2/06 Sandro Cattacin. 2006. 1/11 Ayhan Kaya. 2011. in International Migration and Ethnic Relations Why not “Ghettos”? Islamophobia as a form of Govern- 1/11 The Governance of Migration mentality: Unbearable Weightiness in the Splintering City. of the Politics of Fear Published 1/07 Eva Morawska. 2007. 2011 International Migration: Its Various Mechanisms and Different Theories Editor that Try to Explain It.
    [Show full text]
  • ISSN: 2049-7040 the St Andrews Journal of International Relations Contemporary Voices, Volume 1, Issue 1
    The St Andrews Journal of International Relations Contemporary Voices, Volume 1, Issue 1 - April 2018 ISSN: ISSN:2049-7040 2516-3159 ISSN: 2516-3159 This work is licensed under a Creative Commons Attribution 3.0 License. Contemporary Voices, Volume 1, Issue 1 - April 2018 Contents Articles Terrorism Driven by High Population Growth ������������������������������������������������������������������������������1 by Mario Coccia Are there Wolves among the Sheep? Assessing the threat of Unaffiliated Actor Terrorism in the Context of the European Migration Crisis ��������������������������������������������������������������������������������������������������������������������������������������������14 by Alasdair Kempton Why there is no real difference between a Terrorist Organization and an Organized Crime faction, just a matter of interaction towards the State ��������������������������������������������������������������26 by De Leon Petta A Preliminary Overview of ICT Use in the Boko Haram conflict: A Cyberconflict Perspective �36 by Shola Abidemi Olabode Militarisation, Memorialisation & Multiculture: Muslims and the 2014 Centenary Commemorations of World War One in Britain �������������������������������������������������������������������������50 by Max Cohen Where Does Securitisation Begin? The Institutionalised Securitisation of Illegal Immigration in Sweden: REVA and the ICFs. ������������������������������������������������������������������������������������������������������78 by Stina Fredrika Wassen Contemporary Voices, Volume
    [Show full text]
  • Download Thesis
    This electronic thesis or dissertation has been downloaded from the King’s Research Portal at https://kclpure.kcl.ac.uk/portal/ Islamist Radicalisation in Italy: Myth or Nightmare? An empirical analysis of the Italian case study Groppi, Michele Awarding institution: King's College London The copyright of this thesis rests with the author and no quotation from it or information derived from it may be published without proper acknowledgement. END USER LICENCE AGREEMENT Unless another licence is stated on the immediately following page this work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International licence. https://creativecommons.org/licenses/by-nc-nd/4.0/ You are free to copy, distribute and transmit the work Under the following conditions: Attribution: You must attribute the work in the manner specified by the author (but not in any way that suggests that they endorse you or your use of the work). Non Commercial: You may not use this work for commercial purposes. No Derivative Works - You may not alter, transform, or build upon this work. Any of these conditions can be waived if you receive permission from the author. Your fair dealings and other rights are in no way affected by the above. Take down policy If you believe that this document breaches copyright please contact [email protected] providing details, and we will remove access to the work immediately and investigate your claim. Download date: 28. Sep. 2021 ISLAMIST RADICALISATION IN ITALY: MYTH OR NIGHTMARE? An Empirical Analysis of the Italian Case Study Michele Groppi, PhD Candidate, Defence Studies Programme, King’s College London Dissertation Supervisor: Dr.
    [Show full text]
  • Pressure Cooker Bomb - Wikipedia, the Free Encyclopedia
    Pressure cooker bomb - Wikipedia, the free encyclopedia http://en.wikipedia.org/wiki/Pressure_cooker_bomb From Wikipedia, the free encyclopedia A pressure cooker bomb is a home-made bomb made by placing explosive material Pressure cooker bomb into a pressure cooker and attaching a blasting cap at the top of the cooker.[1] This type of bomb is a popular terrorist weapon. Al-Qaeda have published instructions for making pressure cooker bombs in an online jihadi magazine to encourage "lone wolf" attacks on enemies [2] of jihad. Pressure cooker fragment believed by the FBI to be part of Pressure cooker bombs have been used in a number of attacks in the 21st century. one of the explosive devices used Among them have been the 2006 Mumbai in the 2013 Boston Marathon train bombings, 2010 Stockholm bombings bombings (failed to explode), the 2010 Times Square car bombing attempt (failed to explode), and the 2013 Boston Marathon bombings.[3] 1 Description 2 History 2.1 2000–09 2.2 2010–present 3 See also 4 References 5 External links Pressure cooker bomb - Wikipedia, the free encyclopedia http://en.wikipedia.org/wiki/Pressure_cooker_bomb Pressure cooker bombs are relatively easy to make since - apart from the explosive itself - only readily available materials are needed. The bomb can be ignited using a simple electronic device such as a digital watch, garage door opener, cell phone, pager, kitchen timer, or alarm clock.[1][4] The power of the explosion depends on the size of the pressure cooker and the amount and type of explosives used.[5] Pressure
    [Show full text]
  • Country Reports on Terrorism 2012 (PDF)
    Country Reports on Terrorism 2012 May 2013 ________________________________ United States Department of State Publication Bureau of Counterterrorism Released May 2013 Country Reports on Terrorism 2012 is submitted in compliance with Title 22 of the United States Code, Section 2656f (the “Act”), which requires the Department of State to provide to Congress a full and complete annual report on terrorism for those countries and groups meeting the criteria of the Act. COUNTRY REPORTS ON TERRORISM 2012 Table of Contents Chapter 1. Strategic Assessment Chapter 2. Country Reports Africa Overview, Trans-Sahara Counterterrorism Partnership, The Partnership for East African Regional Counterterrorism, Burkina Faso, Burundi, Cameroon, Chad, Democratic Republic of the Congo, Djibouti, Eritrea, Ethiopia, Kenya, Mali, Mauritania, Niger, Nigeria, Rwanda, Senegal, Somalia, South Africa, South Sudan, Tanzania, Uganda East Asia and Pacific Overview, China (Hong Kong and Macau), Indonesia, Democratic People’s Republic of Korea, Republic of Korea, Malaysia, Philippines, Singapore, Thailand Europe Overview, Austria, Azerbaijan, Belgium, Bosnia and Herzegovina, Bulgaria, Cyprus, Denmark, France, Georgia, Germany, Greece, Ireland, Italy, Kosovo, The Netherlands, Norway, Russia, Serbia, Spain, Sweden, Turkey, United Kingdom (Northern Ireland) Middle East and North Africa Overview, Algeria, Bahrain, Egypt, Iraq, Israel (West Bank and Gaza), Jordan, Kuwait, Lebanon, Libya, Morocco, Oman, Qatar, Saudi Arabia, Tunisia, United Arab Emirates, Yemen South and Central Asia Overview, Afghanistan, Bangladesh, India, Kazakhstan, Kyrgyzstan, Maldives, Nepal, Pakistan, Sri Lanka, Tajikistan, Turkmenistan, Uzbekistan Western Hemisphere Overview, Argentina, Brazil, Canada, Colombia, Mexico, Panama, Paraguay, Peru, Venezuela Chapter 3. State Sponsors of Terrorism Overview Cuba, Iran, Sudan, Syria Chapter 4. The Global Challenge of Chemical, Biological, Radiological, or Nuclear (CBRN) Terrorism 2 Chapter 5.
    [Show full text]
  • Volume X, Issue 6 December 2016 PERSPECTIVES on TERRORISM Volume 10, Issue 6
    ISSN 2334-3745 Volume X, Issue 6 December 2016 PERSPECTIVES ON TERRORISM Volume 10, Issue 6 Table of Contents Welcome from the Editors 1 Articles Jihadi Terrorism in Europe: The IS-Effect 3 by Petter Nesser, Anne Stenersen and Emilie Oftedal Criminal Pasts, Terrorist Futures: European Jihadists and the New Crime-Terror Nexus 25 by Rajan Basra & Peter R. Neumann With a Little Help from my Friends: an Exploration of the Tactical Use of Single-Actor Terrorism by the Islamic State 41 by Clare Ellis IS and the Jihadist Information Highway – Projecting Influence and Religious Identity via Telegram 48 by Nico Prucha “I Just Said It. The State”: Examining the Motivations for Danish Foreign Fighting in Syria 59 by Jakob Sheikh Foreign Fighters in Syria and Iraq and the Socio-Economic Environment They Faced at Home: A Comparison of European Countries 68 by Philip Verwimp Terrorism and Beyond: Exploring the Fallout of the European Foreign Fighter Phenomenon in Syria and Iraq 82 by Jeanine de Roy van Zuijdewijn The French "Iraqi Networks" of the 2000s: Matrix of the 2015 Terrorist Attacks? 97 by Jean-Pierre Filiu Plebeian Jihadism in Denmark: An Individualisation and Popularization Predating the Growth of the Islamic State 102 by Ann-Sophie Hemmingsen Patterns of Involvement among Individuals Arrested for Islamic State-related Terrorist Activities in Spain, 2013-2016 109 by Carola García-Calvo and Fernando Reinares Jihadism in Norway: a Typology of Militant Networks in a Peripheral European Country 121 ISSN 2334-3745 i December 2016 PERSPECTIVES ON TERRORISM Volume 10, Issue 6 by Brynjar Lia and Petter Nesser Countering Violent Extremism with Governance Networks 135 by Anja Dalgaard-Nielsen Why States Fail to Counter Foreign Fighter Mobilizations: The Role of Intelligence Services 140 by Timothy Holman The Future of Jihadism in Europe: A Pessimistic View 156 by Thomas Hegghammer II.
    [Show full text]
  • Whole Day Download the Hansard
    Wednesday Volume 662 26 June 2019 No. 320 HOUSE OF COMMONS OFFICIAL REPORT PARLIAMENTARY DEBATES (HANSARD) Wednesday 26 June 2019 © Parliamentary Copyright House of Commons 2019 This publication may be reproduced under the terms of the Open Parliament licence, which is published at www.parliament.uk/site-information/copyright/. 639 26 JUNE 2019 640 Hywel Williams (Arfon) (PC): How many Welsh House of Commons exporting manufacturers are moving workers to the EU27 to set up front offices, distribution centres and so forth, and what help are the Government giving them to Wednesday 26 June 2019 export Welsh jobs? The House met at half-past Eleven o’clock Alun Cairns: I am grateful to the hon. Gentleman for providing me with the opportunity to highlight the Welsh economy’s export record. Exports are now at PRAYERS £17.7 billion—that is a 7.5% increase, which highlights how the Welsh economy is exporting strongly and at record levels. [MR SPEAKER in the Chair] Jeremy Lefroy (Stafford) (Con): As someone who started his working life at Ford in Bridgend, may I ask the Secretary of State what he is doing to ensure that Oral Answers to Questions high-quality, high-value manufacturing jobs are going to continue at that excellent site, which has such good rail and road connections? WALES Alun Cairns: I am grateful to my hon. Friend; with his local knowledge, having worked at the plant, he The Secretary of State was asked— truly understands the value of the skills that the people there bring. Those skills are a real incentive to attract Leaving the EU: Manufacturing further investment.
    [Show full text]
  • Great Expectations a Sociocognitive Perspective on Attitudes Toward Immigrants
    Great Expectations A Sociocognitive Perspective on Attitudes Toward Immigrants Sanne Maria Noyon Thesis submitted for assessment with a view to obtaining the degree of Doctor of Political and Social Sciences of the European University Institute Florence, 05 June 2017 European University Institute Department of Political and Social Sciences Great Expectations A Sociocognitive Perspective on Attitudes Toward Immigrants Sanne Maria Noyon Thesis submitted for assessment with a view to obtaining the degree of Doctor of Political and Social Sciences of the European University Institute Examining Board Prof. Sven Holger Steinmo, European University Institute (Supervisor) Prof. Delia Baldassarri, New York University Prof. Hanspeter Kriesi, European University Institute Prof. Tom W. G. van der Meer, University of Amsterdam © Sanne Maria Noyon, 2017 No part of this thesis may be copied, reproduced or transmitted without prior permission of the author Researcher declaration to accompany the submission of written work Department of Political and Social Sciences - Doctoral Programme I Sanne Maria Noyon certify that I am the author of the work Great Expectations: A Sociocognitive Perspective on Attitudes Toward Immigrants I have presented for examination for the Ph.D. at the European University Institute. I also certify that this is solely my own original work, other than where I have clearly indicated, in this declaration and in the thesis, that it is the work of others. I warrant that I have obtained all the permissions required for using any material from other copyrighted publications. I certify that this work complies with the Code of Ethics in Academic Research issued by the European University Institute (IUE 332/2/10 (CA 297).
    [Show full text]