World Wide Warriors

Total Page:16

File Type:pdf, Size:1020Kb

World Wide Warriors 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-SA 4.0 © 2019, V&R unipress GmbH, Göttingen ISBN Print: 9783847109389 – ISBN E-Lib: 9783737009386 1 Religion and Transformation 2 in Contemporary European Society 3 4 5 Studying Jihadism 6 7 8 9 10 Band 14 11 12 13 14 15 Herausgegeben von Kurt Appel, Christian Danz, 16 Jakob Helmut Deibl, Rüdiger Lohlker, Richard Potz 17 18 und Sieglinde Rosenberger 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 Die Bände dieser Reihe sind peer-reviewed. 41 Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-SA 4.0 © 2019, V&R unipress GmbH, Göttingen ISBN Print: 9783847109389 – ISBN E-Lib: 9783737009386 1 Rüdiger Lohlker (ed.) 2 3 4 5 6 7 8 World Wide Warriors 9 10 11 How Jihadis Operate Online 12 13 14 15 With 61 figures 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 & 37 V R unipress 38 39 Vienna University Press 40 41 Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-SA 4.0 © 2019, V&R unipress GmbH, Göttingen ISBN Print: 9783847109389 – ISBN E-Lib: 9783737009386 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 Bibliografische Information der Deutschen Nationalbibliothek Die Deutsche Nationalbibliothek verzeichnet diese Publikation in der Deutschen 20 Nationalbibliografie; detaillierte bibliografische Daten sind im Internet über 21 http://dnb.d-nb.de abrufbar. 22 Veröffentlichungen der Vienna University Press 23 erscheinen im Verlag V&R unipress GmbH. 24 25 An electronic version of this book is freely available, thanks to the support of libraries working 26 with Knowledge Unlatched. KU is a collaborative initiative designed to make high quality books Open Access for the public good. The Open Access ISBN of this book is 978-3-7370-0938-6. 27 More information about the initiative and links to the Open Access version can be found at 28 www.knowledgeunlatched.org. 29 © 2019, V&R unipress GmbH, Robert-Bosch-Breite 6, D-37079 Göttingen 30 Dieses Werk ist als Open-Access-Publikation im Sinne der Creative-Commons-Lizenz BY-NC-ND 31 International 4.0 („Namensnennung – Nicht kommerziell – Keine Bearbeitungen“) unter dem 32 DOI 10.14220/9783737009386 abzurufen. Um eine Kopie dieser Lizenz zu sehen, besuchen Sie https://creativecommons.org/licenses/by-nc-nd/4.0/. 33 Jede Verwertung in anderen als den gesetzlich zugelassenen Fällen bedarf der vorherigen 34 schriftlichen Einwilligung des Verlages. 35 36 Umschlagabbildung: RaT-Logo (Gerfried Kabas, Wien). Redaktion: Marlene Deibl 37 38 Vandenhoeck & Ruprecht Verlage | www.vandenhoeck-ruprecht-verlage.com 39 ISSN 2198-5235 40 ISBN 978-3-7370-0938-6 41 Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-SA 4.0 © 2019, V&R unipress GmbH, Göttingen ISBN Print: 9783847109389 – ISBN E-Lib: 9783737009386 Inhalt Rüdiger Lohlker Introduction:Confusionmeets Confusion................. 7 Rüdiger Lohlker Collective Organizers:Lone Wolves, Remote Control, and Virtual Guidance ................................... 9 Ali Fisher Interrogating the electronic ribat: Data Science in the study of the Jihadist movement.............................. 43 Ali Fisher /Nico Prucha AMilestone for “Islamic State” Propaganda: “The Clangingofthe Swords, part4”................................ 71 Clemens Holzgruber “Now Yo uSee Me –Now Yo uDon’t”: Analysing Jihadists’ Online Privacy-Enhancing and Counter-Surveillance Strategies..........157 Contributors .................................193 Index .....................................195 Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-SA 4.0 © 2019, V&R unipress GmbH, Göttingen ISBN Print: 9783847109389 – ISBN E-Lib: 9783737009386 Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-SA 4.0 © 2019, V&R unipress GmbH, Göttingen ISBN Print: 9783847109389 – ISBN E-Lib: 9783737009386 Rüdiger Lohlker Introduction:Confusion meets Confusion As confusing as the role of religion in jihadism1 seems to be for those not familiar with Arab cultureand Islam, almost as confusingisthe role of the Internet in invigorating jihadism for manyresearchers. The chapters of this book will tryto reduce the level of confusion, based on an understanding of theologyand history of Islam and based on insightsfrom Data Science, therebygoing beyond the state of playofmuch Westernconventional research on jihadism. In 1991 in the aftermath of the first war of the USA (and allies) against Iraq an referring to the American Civil WarManuel De Landa stated: “Thedevelopmentofthe metallic cartridge and breech-loading firearms caused a revolution in tactics that took militarycommanders over ahundredyears to digest.”2 Things did not change,another technologyisapplied today. As in former times the impact of these new technologies is still not understood. We are living in aperiodofmilitaryinnovations in which terrorists have weaponized the Internet3 and Jihadi technicians demostrate their abilitytoadopt to new technological developments The chapters of this volume seek to bring together developments in social media, the innovations of jihadists with devel- opments in the strategic thinkingofjihadists, based mainly on evidence based research into Arabic languagesources and documents fromthe jihadists themselves. This volume seeks to remedy adeficiencyofmuchWesternresearch on ji- hadist terrorism, namely its disregard for religion and the Internet. We will leave aside that the surprising factthat terrorism research at least at 9/11 tends to ignore the role of thea coherenttheologyand religion underlying jihadism. The 1Jihadism means atransnationalmovementwith aspecific Islamic theologyand the use of violence as the main distinction from other contemporaryIslamic movements. 2Manuel De Landa, Warinthe AgeofIntelligentMachines,New Yo rk:Swerve Editions1991, p. 29. 3See the remarks on the consumerization of warfareinthe chapter by Lohlker. Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-SA 4.0 © 2019, V&R unipress GmbH, Göttingen ISBN Print: 9783847109389 – ISBN E-Lib: 9783737009386 8 Rüdiger Lohlker authors rely mainly on evidence produced by the jihadis themselves, not ig- noring it as much of conventional research does.4 Rüdiger Lohlker describes the technical aspects of recentjihadist dis- semimation of operational ressources. The chapterincludes further remarks on jihadists online strategies. Ali Fisher criticizes the technical deficienties of current research on jihadism, not understandingthe real operations of jihadistsonline. Ali Fisher and Nico Prucha presentacase study on the dissemination of jihadist videos online. Clemens Holzgruberanalyzes the jihadist discussion on secure communi- cation online giving insides into the tools used by jihadists. All the chapters introduce ressources that are ignored in conventional re- search because they are in Arabic and religiously contextualized. This makes it necessarytodoaclose reading of the sources to enable the research community to leave the mainstream discourses. Stressing acoherenttheologyofjihadism does not mean jihadism is understoodbyreferring to Islam, the Qur’an etc. We subscribetothe idea recently written down by Ould Mohamedou: “In time the problememerged thus:tounderstand Westernterrorists of the 1970s such as the German RedArmyFaction or the Italian RedBrigades, one is invited to examine the societal condition of post-war GermanyItaly,the ambientmalaise in these countries 25 years after Nazism and fascism, and their relationship with their rebellious youth;to makesense of al-Qaeda or IS, one is asked to read the Qur’an.”5 The presentvolume tries to give insightsthat mayremedy this approach turning to the practice of jihadists, not focussing on the speculations about what they think and what is Islam or not.6 We have to thank our reviewer for helping us to clarifysome ideas in this volume. 4Byway of exception, in the case of the attackers of the WTCin2001, the role of the “Spiritual Manual” and its religious contenthas been recognised (HansG.Kippenberg/Tilmann Sei- densticker (eds.), The 9/11 Handbook,London/Oakville, CT:Equinox 2006). 5Mohammad-Mahmoud Ould Mohamedou, ATheory of ISIS:Political Violence and the Transformation of the Global Order,London: Pluto Press 2018,pp. 8–9. 6Shahab Ahmed, What is Islam?The ImportanceofBeing Islamic,Princeton/Oxford:Princeton University Press 2016. Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-SA 4.0 © 2019, V&R unipress GmbH, Göttingen ISBN Print: 9783847109389 – ISBN E-Lib: 9783737009386 Rüdiger Lohlker Collective Organizers:Lone Wolves, Remote Control, and Virtual Guidance Intro Terrorism ‘research’ is dominated by media-induced vocabulary, which tries to demonize and hype the imminentthreatofterrorist violence:lone wolves or remote control terrorism are two of the most prominentphenomena.1 What is neglected, however,isanattempt to understand what is happening on the ground in jihadist practice.2 Thechapter is organizedinarhizomatic waymirroring theswarm-like movement of jihadi online communication (see below); thechapter is notfol- lowing alinearstory line.Itisbased on acareful selectionofjihadionlinecom- munication duringthe last yearsand uses Arabic language sourcestoclose thegap of knowledgethatisevidentincurrentmainstreamresearchonjihadism. Sincethe knowledgeofArabicsources inthisresearchisnegligeable we feel forced to offeras much informationaspossible. Anyattempt of synthesis wouldbepremature and standinthe wayofathorough understandingofjihadicommunition. Discussing jihadi swarms means analyzing collective
Recommended publications
  • Countering the Myths of Is How to Counter the Is Narrative Online? the Case of Albanian Speaking Countries
    REPORT BY KCSS MARCH 2019 / 02 Kosovar Centre for Security Studies COUNTERING THE MYTHS OF IS HOW TO COUNTER THE IS NARRATIVE ONLINE? THE CASE OF ALBANIANSPEAKING COUNTRIES MARCH 2019 Publisher: Kosovar Centre for Security Studies Authors: Vesë Kelmendi & Rudinë Jakupi Internal reviewer: Skender Perteshi External reviewer: Garentina Kraja © All rights reserved by Kosovar Centre for Security Studies. Intellectual property rights protected by Law No. 04/L-065 on Copyright and Related Rights and Law No. 05/L-047 on Amending and Supplementing the Law No. 04/L-065 on Copyright and Related Rights. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical or otherwise, without prior permission of the publisher. Opinions expressed in this publication do not necessarily represent those of Embassy of the Kingdom of the Netherlands. This project was supported by the Embassy of the Netherlands in Kosovo. The views expressed in this research are those of Kosovar Centre for Security This project was supported by the Embassy of the Netherlands in Kosovo. The views expressed in this research are those of Kosovar Centre for Security Studies and do not necessarily represent those of the Embassy of the Netherlands in Kosovo. REPORT BY KCSS 03/2018 Kosovar Centre for Security Studies COUNTERING THE MYTHS OF IS HOWTHE TOUNEXPLORED COUNTER THE NEXUS: IS NARRATIVE ONLINE? THEISSUES CASE OF ALBANIAN-SPEAKINGOF RADICALISATION COUNTRIES AND VIOLENT EXTREMISM IN MACEDONIA MARCH 2018 REPORT BY KCSS TABLE OF CONTENT 1. INTRODUCTION .................................................................................................................6 1.1. Methodology .................................................................................................................................................... 8 2.
    [Show full text]
  • Jihadism: Online Discourses and Representations
    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-ND 4.0 1 Studying Jihadism 2 3 4 5 6 Volume 2 7 8 9 10 11 Edited by Rüdiger Lohlker 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 The volumes of this series are peer-reviewed. 37 38 Editorial Board: Farhad Khosrokhavar (Paris), Hans Kippenberg 39 (Erfurt), Alex P. Schmid (Vienna), Roberto Tottoli (Naples) 40 41 Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-ND 4.0 1 Rüdiger Lohlker (ed.) 2 3 4 5 6 7 Jihadism: Online Discourses and 8 9 Representations 10 11 12 13 14 15 16 17 With many figures 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 & 37 V R unipress 38 39 Vienna University Press 40 41 Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-ND 4.0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 Bibliographic information published by the Deutsche Nationalbibliothek The Deutsche Nationalbibliothek lists this publication in the Deutsche Nationalbibliografie; 24 detailed bibliographic data are available online: http://dnb.d-nb.de.
    [Show full text]
  • An Empirical Survey on How Much Security and Privacy Customers Want in Instant Messengers
    SECURWARE 2016 : The Tenth International Conference on Emerging Security Information, Systems and Technologies An Empirical Survey on how Much Security and Privacy Customers Want in Instant Messengers Thomas Paul Hans-Joachim Hof MuSe – Munich IT Security Research Group Munich University of Applied Sciences Munich University of Applied Sciences Lothstrasse 64, Munich, Germany Lothstraße 64, Munich, Germany e-mail: [email protected] e-mail: [email protected] Abstract— Instant messengers are popular communication developers of future instant messengers to decide on tools used by many people for everyday communication, as security features to implement. well as for work related communication. Following the This paper is structured as follows: Section II discusses disclosure of a massive surveillance system by Edward related work. Section III presents the design of the user Snowden, many users became aware of the risks of unsecure survey. Section IV discusses in detail the findings of the communication. Users increasingly ask for secure communication. However, unsecure instant messengers are still user survey. Section V presents the features of an ideal popular nowadays. This could be due to the fact, that, besides instant messenger fulfilling all the user preferences the large number of available instant messengers, no instant identified by the survey. A market simulation is used to messenger fully satisfies the users preferences. To research the show the potential of this ideal instant messenger. Section acceptance of security mechanisms in instant messengers, this VI summarizes the findings of the paper. paper presents an evaluation of user preferences for secure instant messengers. A user survey was conducted to rate the II.
    [Show full text]
  • Investigating Mobile Messaging Security
    Technische Universitat¨ Munchen¨ Department of Informatics Interdisciplinary Project in Electrical Engineering Investigating Mobile Messaging Security Elias Hazboun Technische Universitat¨ Munchen¨ Department of Informatics Interdisciplinary Project in Electrical Engineering Investigating Mobile Messaging Security Untersuchung von Mobile Messaging Sicherheit Author Elias Hazboun Supervisor Prof. Dr.-Ing. Georg Carle Advisor Dr. Matthias Wachs, Quirin Scheitle Date April 27, 2016 Informatik VIII Chair for Network Architectures and Services Abstract In this report we document our work in analyzing the security of a selection of mobile messaging apps. Focusing on network based security, we studied traffic generated by the apps to gain an understanding of the current state of applying encryption and authentication protocols. Our findings show a positive trend in security with developers steadily improving security with newer app updates partly due to the increased scrutiny from the community and academia. Although not all apps analyzed had perfect state of the art security properties, none have shown any major vulnerabilities exploited by normal adversaries. It was also evident that only one app - namely TextSecure - is using the industry standard TLS for server-client authentication and security while others have opted for custom made protocols and algorithms. I Contents 1 Introduction 1 1.1 Research Question . .2 1.2 Outline . .2 2 Background and Related Work 3 2.1 Methodology . .3 2.1.1 App Selection . .3 2.1.2 Approach . .3 2.2 Definition of Security Concepts . .4 2.2.1 Layers of Encryption . .4 2.2.2 Transport Layer Security Protocol (TLS) . .5 2.2.3 Perfect Forward Secrecy (PFS) . .5 2.2.4 Asynchronous Messaging Security .
    [Show full text]
  • Enterprise Edition
    Secure Communication. Simplified. SAFECHATS Problem Most companies use popular insecure email and ⛔ messaging services to communicate confidential information P The information flow within the Company is ⛔ disorganized Metadata is exposed and available to third-party ⛔ services SAFECHATS Introducing SAFECHATS Ultra-secure communication solution P Designed with security in mind SAFECHATS Why SAFECHATS? ✔ Information is always end-to-end encrypted by default P ✔ All-in-one communication suite: • Text messaging (one-on-one and group chats) • Voice calls • File transfers (no size and file type limits) SAFECHATS How does SAFECHATS solve the problem? ✔ Customizable white label solution ✔ Integrates with existing softwareP infrastructure ✔ Enterprise-wide account and contact list management, supervised audited chats for compliance SAFECHATS What makes SAFECHATS different? ✔ Your own isolated cloud environment or on-premise deployment P ✔ Customizable solution allows to be compliant with internal corporate security policies ✔ No access to your phone number and contact list SAFECHATS Screenshot Protection ✔ Notifications on iOS P ✔ DRM protection on Android SAFECHATS Identity Verification ✔ Protection from man-in-the-middle attacksP ✔ SMP Protocol SAFECHATS Privacy Features ✔ Show / hide messages and files P ✔ Recall messages and files ✔ Self-destructing messages and files SAFECHATS Additional Protection ✔ History retention control P ✔ Application lock: • PIN-code • Pattern-lock on Android devices • Touch ID on iOS devices SAFECHATS How does SAFECHATS
    [Show full text]
  • Urgensi Ijtihad Saintifik Dalam Menjawab Problematika Hukum Transaksi Kontemporer
    Volume 4, Nomor 2, Desember 2011 URGENSI IJTIHAD SAINTIFIK DALAM MENJAWAB PROBLEMATIKA HUKUM TRANSAKSI KONTEMPORER Oleh : Fauzi M Abstract: This article will discuss abaout the rational urgency to do scientific ijtihad to answer the legal issues of contemporary transaction and also perform scientific ijtihad basis and examples of scientific ijtihad in answering legal issues of contemporary transactions. Key words: rational urgency, scientific ijtihad, contemporary transaction. Pendahuluan Era globalisasi (the age of globalization), dalam beberapa literatur dinyatakan bermula pada dekade 1990‐an.1 Era ini ditandai, diantaranya dengan adanya fenomena penting dalam bidang ekonomi. Kegiatan ekonomi dunia tidak hanya dibatasi oleh faktor batas geografi, bahasa, budaya dan ideologi, akan tetapi lebih karena faktor saling membutuh‐kan dan saling bergantung satu sama lain.2 Dunia menjadi seakan‐akan tidak ada batas, terutama karena perkembangan teknologi informasi yang begitu pesat. Keadaan yang 1 Globalization is accepted as one of the fundamental of the processes that characterize the contemporary world, a process leading towards an increasingly strong interdependence between increasingly large parts of the world. S. Parvez Manzoor (2004), “Book Review ‘Islam in the Era of Globalization: Muslim Attitudes Towards Modernity and Identity” oleh Johan Meuleman (ed.) (2002), London: RoutledgeCurzon, dimuat dalam Journal of Islamic Studies, Vol. 15, No. 2, Mei 2004, Oxford: Oxford Centre for Islamic Studies, h. 280. 2 Jan Pronk (2001), “Globalization: A Developmental Approach”, dalam Jan Nederveen Pieterse (ed.), Global Futures, Shaping Globalization, London: Zed Books, h. 43. 20 Fauzi M, Urgensi Ijtihad ... demikian melahirkan banyak peluang sekaligus tantangan,3 terutamanya dalam hal transaksi (muamalah) kepa‐da semua pihak, termasuk umat Islam.4 Proses globalisasi diperkirakan semakin bertambah cepat pada masa mendatang, sebagaimana dikemukakan oleh Colin Rose bahwa dunia sedang berubah dengan kecepatan langkah yang belum pernah terjadi sebelumnya.
    [Show full text]
  • Cryptography Whitepaper
    Cryptography Whitepaper Threema uses modern cryptography based on open source components that strike an optimal balance between security, performance and message size. In this whitepaper, the algorithms and design decisions behind the cryptography in Threema are explained. VERSION: JUNE 21, 2021 Contents Overview 4 Open Source 5 End-to-End Encryption 5 Key Generation and Registration 5 Key Distribution and Trust 6 Message Encryption 7 Group Messaging 8 Key Backup 8 Client-Server Protocol Description 10 Chat Protocol (Message Transport Layer) 10 Directory Access Protocol 11 Media Access Protocol 11 Cryptography Details 12 Key Lengths 12 Random Number Generation 13 Forward Secrecy 14 Padding 14 Repudiability 15 Replay Prevention 15 Local Data Encryption 15 iOS 15 Android 16 Key Storage 16 iOS 16 Android 16 Push Notifications 17 iOS 17 Android 17 Threema • Cryptography Whitepaper Address Book Synchronization 17 Linking 18 ID Revocation 19 An Example 19 Profile Pictures 19 Web Client 20 Architecture 20 Connection Buildup 21 WebRTC Signaling 22 WebRTC Connection Buildup 22 Trusted Keys / Stored Sessions 23 Push Service 23 Self Hosting 24 Links 24 Threema Calls 24 Signaling 24 Call Encryption 24 Audio Encoding 25 Video Encoding 25 Privacy / IP Exposure 25 Threema Safe 26 Overview 26 Backup Format 27 Encryption 27 Upload/Storage 27 Backup Intervals 28 Restore/Decryption 28 Running a Custom Threema Safe Server 28 Threema • Cryptography Whitepaper Overview Threema uses two different encryption layers to protect messages between the sender and the recipient. • End-to-end encryption layer: this layer is between the sender and the recipient. • Transport layer: each end-to-end encrypted message is encrypted again for transport between the client and the server, in order to protect the header information.
    [Show full text]
  • M. Fethullah Gülen's Understanding of Sunnah
    M. FETHULLAH GÜLEN’S UNDERSTANDING OF SUNNAH Submitted by Mustafa Erdil A thesis in total fulfilment of the requirements for the degree of Doctor of Philosophy School of Theology Faculty of Theology and Philosophy Australian Catholic University Research Services Locked Bag 4115 Fitzroy, Victoria 3065 Australia 23 JULY 2016 1 | P a g e STATEMENT OF AUTHORSHIP AND SOURCES This thesis contains no material published elsewhere or extracted in whole or in part from a thesis by which I have qualified for or been awarded another degree or diploma. No other person’s work has been used without due acknowledgement in the main text of the thesis. This thesis has not been submitted for the award of any degree or diploma in any other tertiary institution. All research procedures in the thesis received the approval of the relevant Ethics/Safety Committees (where required). Mustafa Erdil 23 JULY 2016 Signature: ABSTRACT The aim and objective of this study is to highlight the importance of and the status of hadith in Islam, as well as its relevance and reference to sunnah, the Prophetic tradition and all that this integral source of reference holds in Islam. Furthermore, hadith, in its nature, origin and historical development with its close relationship with the concept of memorisation and later recollection came about after the time of Prophet Muhammad. This study will thus explore the reasons behind the prohibition, in its initial stage, with the authorisation of recording the hadiths and its writing at another time. The private pages of hadith recordings kept by the companions will be sourced and explored as to how these pages served as prototypes for hadith compilations of later generations.
    [Show full text]
  • Why Do Foreign Fighters Join Islamic State? the Case of Kosovo
    WHY DO FOREIGN FIGHTERS JOIN ISLAMIC STATE? THE CASE OF KOSOVO ASYA METODIEVA STRATEGIC UPDATE DECEMBER 2018 Currently ranked Europe’s top university affiliated think tank. LSE IDEAS is LSE’s foreign policy think tank. We connect academic knowledge of diplomacy and strategy with the people who use it. Through sustained engagement with policymakers and opinion-formers, IDEAS provides a forum that informs policy debate and connects academic research with the practice of diplomacy and strategy. IDEAS hosts interdisciplinary research projects, produces working papers and reports, holds public and off-the- record events, and delivers cutting-edge executive training programmes for government, business and third-sector organisations. @lseideas facebook/lseideas Why do foreign fighters join Islamic State? The Case of Kosovo1 ASYA MetODIEVA Introduction Foreign fighter mobilisation is not a new phenomenon. However, it has only become a serious political issue worldwide with the rise of the Islamic State (IS). More than 42,000 people from 120 countries have travelled to Iraq and Syria between 2011 and 2016.2 Previous studies on IS have been largely concerned with the growth of the phenomenon in the West.3 Meanwhile, countries with recent experience in violence have also contributed to the numbers in Europe but received less attention from scholars and security experts. More than 900 people from the Western Balkans have joined the ranks of IS and other radical groups.4 364 of them originate from Kosovo, the youngest country in the region, born out of the the dissolution of Yugoslavia. This Strategic Update looks at the emergence of foreign fighter cells in societies with a recent war experience.
    [Show full text]
  • How Secure Is Textsecure?
    How Secure is TextSecure? Tilman Frosch∗y, Christian Mainkay, Christoph Badery, Florian Bergsmay,Jorg¨ Schwenky, Thorsten Holzy ∗G DATA Advanced Analytics GmbH firstname.lastname @gdata.de f g yHorst Gortz¨ Institute for IT-Security Ruhr University Bochum firstname.lastname @rub.de f g Abstract—Instant Messaging has gained popularity by users without providing any kind of authentication. Today, many for both private and business communication as low-cost clients implement only client-to-server encryption via TLS, short message replacement on mobile devices. However, until although security mechanisms like Off the Record (OTR) recently, most mobile messaging apps did not protect confi- communication [3] or SCIMP [4] providing end-to-end con- dentiality or integrity of the messages. fidentiality and integrity are available. Press releases about mass surveillance performed by intelli- With the advent of smartphones, low-cost short-message gence services such as NSA and GCHQ motivated many people alternatives that use the data channel to communicate, to use alternative messaging solutions to preserve the security gained popularity. However, in the context of mobile ap- and privacy of their communication on the Internet. Initially plications, the assumption of classical instant messaging, fueled by Facebook’s acquisition of the hugely popular mobile for instance, that both parties are online at the time the messaging app WHATSAPP, alternatives claiming to provide conversation takes place, is no longer necessarily valid. secure communication experienced a significant increase of new Instead, the mobile context requires solutions that allow for users. asynchronous communication, where a party may be offline A messaging app that claims to provide secure instant for a prolonged time.
    [Show full text]
  • Responding to the Next Attack
    Combating Terrorism Center at West Point Objective • Relevant • Rigorous | May 2017 • Volume 10, Issue 5 FEATURE ARTICLE A VIEW FROM THE CT FOXHOLE Responding to the James Next Attack Gagliano Learning from the police response in Orlando and San Bernardino Former FBI Hostage Rescue Team Frank Straub, Jennifer Zeunik, and Ben Gorban Counterterrorist Operator FEATURE ARTICLE Editor in Chief 1 Lessons Learned from the Police Response to the San Bernardino and Orlando Terrorist Attacks Paul Cruickshank Frank Straub, Jennifer Zeunik, and Ben Gorban Managing Editor INTERVIEW Kristina Hummel 8 A View from the CT Foxhole: James A. Gagliano, Former FBI Hostage Rescue EDITORIAL BOARD Team Counterterrorist Operator Paul Cruickshank Colonel Suzanne Nielsen, Ph.D. Department Head ANALYSIS Dept. of Social Sciences (West Point) 13 A New Age of Terror? Older Fighters in the Caliphate Lieutenant Colonel Bryan Price, Ph.D. John Horgan, Mia Bloom, Chelsea Daymon, Wojciech Kaczkowski, Director, CTC and Hicham Tiflati 20 The Terror Threat to Italy: How Italian Exceptionalism is Rapidly Brian Dodwell Diminishing Deputy Director, CTC Michele Groppi 29 Iranian Kurdish Militias: Terrorist-Insurgents, Ethno Freedom Fighters, or CONTACT Knights on the Regional Chessboard? Combating Terrorism Center Franc Milburn U.S. Military Academy 607 Cullum Road, Lincoln Hall In the early hours of June 12, 2016, an Islamic State-inspired gunman car- West Point, NY 10996 ried out the deadliest terrorist attack on U.S. soil since 9/11, shooting dead 49 people in an Orlando nightclub. The attacker was finally killed after a Phone: (845) 938-8495 three-hour hostage standof, leading to questions raised in the media over the police response.
    [Show full text]
  • Anarchism, Individualism and Communism: William Morris's Critique of Anarcho-Communism
    Loughborough University Institutional Repository Anarchism, individualism and communism: William Morris's critique of anarcho-communism This item was submitted to Loughborough University's Institutional Repository by the/an author. Citation: KINNA, R., 2012. Anarchism, individualism and communism: William Morris's critique of anarcho-communism. IN: Prichard, A. ... et al (eds). Liber- tarian Socialism: Politics in Black and Red. Houndsmill, Basingstoke: Palgrave Macmillan, pp.35-56. Additional Information: • This is a book chapter. It is reproduced with permission of Palgrave Macmillan. This extract is taken from the author's original manuscript and has not been edited. The definitive, published, version of record is available here: www.palgrave.com Metadata Record: https://dspace.lboro.ac.uk/2134/12730 Version: Accepted for publication Publisher: Palgrave MacMillan ( c Alex Prichard, Ruth Kinna, Saku Pinta and Dave Berry) Please cite the published version. This item was submitted to Loughborough’s Institutional Repository (https://dspace.lboro.ac.uk/) by the author and is made available under the following Creative Commons Licence conditions. For the full text of this licence, please go to: http://creativecommons.org/licenses/by-nc-nd/2.5/ 3 Anarchism, Individualism and Communism: William Morris’s Critique of Anarcho- communism Ruth Kinna Introduction William Morris’s commitment to revolutionary socialism is now well established, but the nature of his politics, specifically his relationship to Marxism and anarchist thought, is still contested. Perhaps, as Mark Bevir has argued, the ideological label pinned to Morris’s socialism is of ‘little importance’ for as long as his political thought is described adequately. Nevertheless, the starting point for this essay is that thinking about the application of ideological descriptors is a useful exercise and one which sheds important light on Morris’s socialism and the process of ideological formation in the late nineteenth-century socialist movement.
    [Show full text]