Rival Consolidation in Nascent Insurrections: Why Some Militant Groups Wage Sustained Insurgencies

Total Page:16

File Type:pdf, Size:1020Kb

Rival Consolidation in Nascent Insurrections: Why Some Militant Groups Wage Sustained Insurgencies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`)8)3#!a`)N\!b%00*)C--4D!C'-! <2%4)4!3#!)(8*#!4)A)*-:3).0!(1!(!#-2.<!1&'-*(8O!V8O!b%00*)C--4!0(2<'0!3)!0')! %3:-80(.&)!-6!:2812%.<!(!:8-_)&0!0'(0!,)):1!3)!)W&%0)4!(.4!3-0%A(0)4O!Z)!C(1!)W08)3)*#! ).&-28(<%.<!(.4!)*%3%.(0)4!(.#!1).1)!-6!2.&)80(%.0#!(0!)(&'!10):!-6!0')!:8-&)11O!>0!C(1! 1(4!0-!1))!V8O!b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b%00*)C--4! (.4!V8O!J%*.)8!6-8!0(,%.<!3)!-.!(1!(!8)1)(8&'!(11%10(.0!6-8!1)A)8(*!:8-_)&01!0'(0!')*:)4! *(2.&'!3#!&(8))8O!! !! >!-C)!(!4)"0!-6!<8(0%024)!0-!3#!(4A%1-8!V8O!^-C*(.41O!Z)!0(2<'0!3#!&-'-80!'-C!0-! 4)A)*-:!1-*%4!8)1)(8&'!4)1%<.1!(.4!<2%4)4!3)!0'8-2<'!1)A)8(*!;2(.0%0(0%A)!(.(*#1)1!P!%.! 3#!0')1%1!(.4!")#-.4O!$-8)!%3:-80(.0*#D!')!4%1:*(#1!(!<).2%.)!(.4!2.8%A(*)4!&(8)!6-8!'%1! 1024).01\!:8-6)11%-.(*!4)A)*-:3).0O!>!(3!(*1-!0'(.,62*!6-8!3#!(4A%1-8!V8O!+0):'(.%)! ?(8A%.!6-8!')8!6))4"(&,!(.4!:-*%&#R8)*)A(.0!%.1%<'01O!! ! $#!)W0)8.(*!)W(3%.)81D!V8O!/11(6!$-<'(4(3!(.4!V8O!$%8(!+2&'(8-AD!:8-A%4)4!A)8#! &-.1082&0%A)!&-33).01!428%.<!3#!4%11)80(0%-.!4)6).&)O!>!(3!:8-24!0-!"2%*4!4%8)&0*#!68-3! /11(6\1!1)3%.(*!C-8,!-.!0)88-8%10!<8-2:!&--:)8(0%-.D!(!8)1)(8&'!:8-<8(3!')!&-.0%.2)1!0-! 4)A)*-:!68-3!3#!(*3(!3(0)8Y!Q')!>.0)84%1&%:*%.(8#!?).0)8!K>V?L!Z)8N*%#(!%.!>18()*O!! ! =9+>/\1!(43%.%108(0%A)!10(66!(8)!"(8!.-.)!0')!3-10!(00).0%A)!(.4!&(8%.<!:)-:*)!(0!0')! 1&'--*D!)1:)&%(**#!9(08%&%(!b(&8-%WD!C'-!:*(#)4!(.!%.4%1:).1("*)!8-*)!0'8-2<'-20!0'%1! ).0%8)!:8-&)11O!! ! >!(3!%.4)"0)4!0-!0')!?(.(4%(.!=)0C-8,!6-8!^)1)(8&'!-.!Q)88-8%13D!+)&28%0#!(.4!+-&%)0#! KQ+/+L!6-8!%01!&-.1%10).0!(.4!<).)8-21!12::-80!0'8-2<'-20!3#!1024%)1D!%.&*24%.<!62.4%.<! 3#!:(80%&%:(0%-.!%.!1)A)8(*!1&'-*(8*#!&-.6)8).&)1!(.4!8)1)(8&'!-::-802.%0%)1!(&8-11!=-80'! /3)8%&(!(.4!>18()*O!>!(*1-!4):).4)4!')(A%*#!-.!=9+>/D!?(8*)0-.!@.%A)81%0#D!(.4!0')! 98-A%.&)!-6!B.0(8%-!KB.0(8%-!78(42(0)!+&'-*(81'%:L!6-8!(C(84%.<!3(_-8!62.4%.<! -::-802.%0%)1!(.4!08(A)*!<8(.01O! ! >!(3!)1:)&%(**#!0'(.,62*!0-!0')!5-8)%<.!9-*%&#!^)1)(8&'!(.4!5-8)1%<'0!0)(3!(0!0')! V):(803).0!-6!7*-"(*!/66(%81!?(.(4(!6-8!<%A%.<!3)!0')!-::-802.%0#!0-!1)8A)!(1!%01! ?(4%)2WRbc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d%&0-8!/1(*D!$%(!]*--3D!/.48)C!])..)00D!$%,)!J%43)%)8D! /*)W!?-8")%*D!V)8),!])(&'D!+)(.!J%.&')10)8D!(.4!.23)8-21!=9+>/!:8-6)11-81!(.4! <8(42(0)!1024).01O! ! >!(*1-!0'(.,!`-1'![%*")8<!C'-!:(A)4!0')!C(#!6-8!3)!(.4!-0')8!=9+>/!9'OVO!1024).01O! 7)00%.<!0'%1!0')1%1!-66!0')!<8-2.4!C(1!:-11%"*)!")&(21)!-6!`-1'\1!.-A)*!4(0(1)0D!:8(&0%&(*! (4A%&)D!(.4!68%).4*#!%.1%<'0O!! ! $#!<8)(0!68%).4!@8%!$(8(.0N!4)1)8A)1!1:)&%(*!3).0%-.O!Z)!1)8A)4!(1!(.!%.6-83(*!0')1%1! (4A%1-8!0'(0!&-.1082&0%A)*#!&8%0%;2)4!)A)8#!&'(:0)8!%.!0'%1!4%11)80(0%-.!(.4!:21')4!3)!0-! 0'%.,!0'8-2<'!0')!*-<%&!-6!3#!(8<23).0!("-A)!(.#-.)!)*1)O!! ! >!(3!<8(0)62*!6-8!3#!-*4)8!1%10)81D!XA<).#(!(.4!+-.%(D!C'-!1)0!12&'!(!'%<'!10(.4(84!6-8! 12&&)11!(1!%.0)**)&02(*!<%(.01!%.!0')%8!8)1:)&0%A)!6%)*41!-6!(108-.-3#!(.4!*(CO!J)!(8)! *2&,#!0-!'(A)!:(8).01!0'(0!).&-28(<)4!(.4!).("*)4!21!0-!:2812)!-28!48)(3!&(8))81O! ! Q-!3#!3-0')8!/..(Y!0'(.,!#-2!6-8!(*C(#1!")%.<!1-!&-3:(11%-.(0)D!(00).0%A)D!(.4! (::8-:8%(0)*#!0-2<'O!/**!-6!0'-1)!)A).%.<1!4-%.<!)W08(!'-3)C-8,!(.4!3(0'!*)11-.1!(1!(! ,%4!P!)A).!0'-2<'!>!C-2*4!'(A)!8(0')8!:*(#)4!3-8)!"(1,)0"(**!P!8)(**#!:(%4!-66O!/1!(! 12&&)1162*!:8%.&%:(*!(.4!)42&(0-8D!1')!1'-C)4!3)!0'(0!C)!(8)!(**!1024).01!0'(0!&(.! &-.0%.2-21*#!C-8,!0-C(841!8)(&'%.<!.)C!%.0)**)&02(*!')%<'01O!! ! $#!6(0')8!b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b%10!-6!Q("*)1!(.4!5%<28)1!! ! ! ! ! ! ! ! W%! 'I@?FE!&C-E& JK&0),2(+1.,"()3&!/$**/**")<&0)*12</).6&C)*/,&&&& & & & & J& ! HOH!92NN*)!! ! ! ! ! ! ! ! ! H! ! HOF!^)1)(8&'!e2)10%-.!! ! ! ! ! ! ! F! ! HOf!/8<23).0!!! ! ! ! ! ! ! ! f! ! ! HOfOH!+&-:)!?-.4%0%-.1!! ! ! ! ! ! g! ! HOS!$-0%A(0%-.!(.4!+%<.%6%&(.&)!! ! ! ! ! ! T! ! HOg!>3:-80(.&)!6-8!9-*%&#!(.4!0')!/.(*#0%&!?-332.%0#!! ! ! HH! ! HOT!?-.&):01!h!V)6%.%0%-.1!! ! ! ! ! ! ! Hf! ! ! HOTOH!@.%0R-6R(.(*#1%1Y!$%*%0(.0!<8-2:!! ! ! ! Hg! ! ! HOTOF!?-.10%02).0!8%A(*1!! ! ! ! ! ! HU! ! ! HOTOf!V):).4).0!A(8%("*)Y!+210(%.)4!(83)4!&-.6*%&0!! ! ! Hi! ! HOU!^)1)(8&'!V)1%<.!! ! ! ! ! ! ! ! FF! ! HOi!?-.08%"20%-.!h!+233(8#!-6!5%.4%.<1!! ! ! ! ! FT! 'I@?FE!&F4C& LK&9"%",$).6&$)+&0)*12</).6&C)*/,3&@&!/#"/M&(>&,5/&D",/2$,12/&&
Recommended publications
  • The Origins of Hamas: Militant Legacy Or Israeli Tool?
    THE ORIGINS OF HAMAS: MILITANT LEGACY OR ISRAELI TOOL? JEAN-PIERRE FILIU Since its creation in 1987, Hamas has been at the forefront of armed resistance in the occupied Palestinian territories. While the move- ment itself claims an unbroken militancy in Palestine dating back to 1935, others credit post-1967 maneuvers of Israeli Intelligence for its establishment. This article, in assessing these opposing nar- ratives and offering its own interpretation, delves into the historical foundations of Hamas starting with the establishment in 1946 of the Gaza branch of the Muslim Brotherhood (the mother organization) and ending with its emergence as a distinct entity at the outbreak of the !rst intifada. Particular emphasis is given to the Brotherhood’s pre-1987 record of militancy in the Strip, and on the complicated and intertwining relationship between the Brotherhood and Fatah. HAMAS,1 FOUNDED IN the Gaza Strip in December 1987, has been the sub- ject of numerous studies, articles, and analyses,2 particularly since its victory in the Palestinian legislative elections of January 2006 and its takeover of Gaza in June 2007. Yet despite this, little academic atten- tion has been paid to the historical foundations of the movement, which grew out of the Muslim Brotherhood’s Gaza branch established in 1946. Meanwhile, two contradictory interpretations of the movement’s origins are in wide circulation. The !rst portrays Hamas as heir to a militant lineage, rigorously inde- pendent of all Arab regimes, including Egypt, and harking back to ‘Izz al-Din al-Qassam,3 a Syrian cleric killed in 1935 while !ghting the British in Palestine.
    [Show full text]
  • Sunni Suicide Attacks and Sectarian Violence
    Terrorism and Political Violence ISSN: 0954-6553 (Print) 1556-1836 (Online) Journal homepage: http://www.tandfonline.com/loi/ftpv20 Sunni Suicide Attacks and Sectarian Violence Seung-Whan Choi & Benjamin Acosta To cite this article: Seung-Whan Choi & Benjamin Acosta (2018): Sunni Suicide Attacks and Sectarian Violence, Terrorism and Political Violence, DOI: 10.1080/09546553.2018.1472585 To link to this article: https://doi.org/10.1080/09546553.2018.1472585 Published online: 13 Jun 2018. Submit your article to this journal View related articles View Crossmark data Full Terms & Conditions of access and use can be found at http://www.tandfonline.com/action/journalInformation?journalCode=ftpv20 TERRORISM AND POLITICAL VIOLENCE https://doi.org/10.1080/09546553.2018.1472585 Sunni Suicide Attacks and Sectarian Violence Seung-Whan Choi c and Benjamin Acosta a,b aInterdisciplinary Center Herzliya, Herzliya, Israel; bInternational Institute for Counter-Terrorism, Herzliya, Israel; cPolitical Science, University of Illinois at Chicago, Chicago, Illinois, USA ABSTRACT KEY WORDS Although fundamentalist Sunni Muslims have committed more than Suicide attacks; sectarian 85% of all suicide attacks, empirical research has yet to examine how violence; Sunni militants; internal sectarian conflicts in the Islamic world have fueled the most jihad; internal conflict dangerous form of political violence. We contend that fundamentalist Sunni Muslims employ suicide attacks as a political tool in sectarian violence and this targeting dynamic marks a central facet of the phenomenon today. We conduct a large-n analysis, evaluating an original dataset of 6,224 suicide attacks during the period of 1980 through 2016. A series of logistic regression analyses at the incidence level shows that, ceteris paribus, sectarian violence between Sunni Muslims and non-Sunni Muslims emerges as a substantive, signifi- cant, and positive predictor of suicide attacks.
    [Show full text]
  • The Legitimacy of the Modern Militia
    Ouachita Baptist University Scholarly Commons @ Ouachita Honors Theses Carl Goodson Honors Program 2001 The Legitimacy of the Modern Militia Jonathan Huber Ouachita Baptist University Follow this and additional works at: https://scholarlycommons.obu.edu/honors_theses Part of the Constitutional Law Commons, Political Science Commons, and the United States History Commons Recommended Citation Huber, Jonathan, "The Legitimacy of the Modern Militia" (2001). Honors Theses. 134. https://scholarlycommons.obu.edu/honors_theses/134 This Thesis is brought to you for free and open access by the Carl Goodson Honors Program at Scholarly Commons @ Ouachita. It has been accepted for inclusion in Honors Theses by an authorized administrator of Scholarly Commons @ Ouachita. For more information, please contact [email protected]. .. The Legitimacy of the Modem Militia Jonathan Huber Honors Thesis Ouachita Baptist University April 26, 2001 Introduction On May 16, 2001, barring any last minute court appeals, Timothy MeVeigh will be executed for his role in the bombing of the Alfred P. Murrah Federal Building in Oklahoma City. He along with thousands of other Americans who have joined private armies, known as militia, to fight the American government share a common belief that the American government is corrupt at its core and actions such as this one are at the very least patriotic. To most Americans, however, acts such as the bombing of the Oklahoma City Federal Building are not only terroristic, but demonstrate the need for the American government to crack down on these type of organizations to prevent similar atrocities. Is there any justification for the existence of militia groups in the United States, even though most Americans deplore their actions and ideals? This paper will examine the historical use of the militia in the United States and its modem adaptation of militia heritage as well as several different types of militias and recent events that have helped this topic to emerge to the forefront of current discourse.
    [Show full text]
  • Islamist Militancy in the Pakistan-Afghanistan Border Region and U.S. Policy
    = 81&2.89= .1.9&3(>=.3=9-*=&0.89&38 +,-&3.89&3=47)*7=*,.43=&3)=__=41.(>= _=1&3=74389&)9= 5*(.&1.89=.3=4:9-=8.&3=++&.78= *33*9-=&9?2&3= 5*(.&1.89=.3=.))1*=&89*73=++&.78= 4;*2'*7=,+`=,**2= 43,7*88.43&1= *8*&7(-=*7;.(*= 18/1**= <<<_(78_,4;= -.10-= =*5479=+47=43,7*88 Prepared for Members and Committees of Congress 81&2.89= .1.9&3(>=.3=9-*=&0.89&38+,-&3.89&3=47)*7=*,.43=&3)=__=41.(>= = :22&7>= Increasing militant activity in western Pakistan poses three key national security threats: an increased potential for major attacks against the United States itself; a growing threat to Pakistani stability; and a hindrance of U.S. efforts to stabilize Afghanistan. This report will be updated as events warrant. A U.S.-Pakistan relationship marked by periods of both cooperation and discord was transformed by the September 2001 terrorist attacks on the United States and the ensuing enlistment of Pakistan as a key ally in U.S.-led counterterrorism efforts. Top U.S. officials have praised Pakistan for its ongoing cooperation, although long-held doubts exist about Islamabad’s commitment to some core U.S. interests. Pakistan is identified as a base for terrorist groups and their supporters operating in Kashmir, India, and Afghanistan. Since 2003, Pakistan’s army has conducted unprecedented and largely ineffectual counterterrorism operations in the country’s Federally Administered Tribal Areas (FATA) bordering Afghanistan, where Al Qaeda operatives and pro-Taliban insurgents are said to enjoy “safe haven.” Militant groups have only grown stronger and more aggressive in 2008.
    [Show full text]
  • AA-Postscript 2.Qxp:Layout 1
    WEDNESDAY, JUNE 29, 2016 Cameron faces EU music after Israel causes summer water shortages for Palestinians shock Brexit vote Page 8 Page 10 QAA, Lebanon: Lebanese Christian women hold weapons as residents of this Christian village near Lebanon’s border with war-ravaged Syria secure the area yesterday after two waves of suicide bombings struck the village, killing and wounding several people. —AFP Lebanon fearing more attacks Interior minister says attackers came from Syria, not camps BEIRUT/QAA, Lebanon: The Lebanese Local authorities imposed curfews Show of Force government warned yesterday of a on Syrian refugees in the area following “The whole village is mobilizing. heightened terrorist threat after eight sui- the attacks. The Lebanese army said it Everyone - men and women - are sit- cide bombers targeted a Christian village had mounted dawn raids on Syrian ting in front of their homes to protect at the border with Syria, the latest refugee camps, detaining 103 people them after the terror that we lived yes- spillover of its conflict into Lebanon. The for being illegally present in the coun- terday,” said local official Mansur Saad. village of Qaa was targeted on Monday in try. The majority of Syrian refugees have One man with silver-grey hair and clad two waves of suicide attacks that killed no legal status in Lebanon due to the in a black vest poured himself a small five people. The first group of bombers complications and costs of obtaining or cup of coffee, his assault rifle lying in attacked before dawn and the second lat- renewing residency rights under rules his lap.
    [Show full text]
  • THE PLIGHT of CIVILIANS in the SYRIAN CIVIL WAR: a COMPARATIVE APPLICATION of MASS KILLING LITERATURE to STATE and NON-STATE ACTORS Freya Jamison I
    76 NOWHERE TO TURN - THE PLIGHT OF CIVILIANS IN THE SYRIAN CIVIL WAR: A COMPARATIVE APPLICATION OF MASS KILLING LITERATURE TO STATE AND NON-STATE ACTORS Freya Jamison I. INTRODUCTION Tree-year-old Aylan Kurdi shocked the world in early May 2016, when im- ages of the Syrian toddler’s drowned and lifeless body went viral on global media. In the words of British-Somali poet Warsan Shire, “no one puts their children in a boat / unless the water is safer than the land.”1 For many Syrians, risking everything to fee their war-torn homes is the only hope for enduring the country’s bloody civil war. For far too many more, feeing is not an option, and the best chance for survival is keeping one’s head down and hoping not to be noticed by any of the belligerents. It is clear that civilians have born the brunt of atrocities in the civil war that has plagued Syria since 2011; what is not clear is why. Te intentional targeting of Syrian noncombatants is a well-established practice of both the government forces commanded by President Bashar al-Assad and the Islamic State of Iraq and the Levant (ISIL). Te second part of this paper provides an overview of civilian causalities in the Syrian Civil War. Part three examines the literature on the reasons for mass killing and applies these theo- ries to the actions of the Assad government and the Islamic State. Part four reviews the literature on mass killing on the individual level and how it relates to the Syrian confict.
    [Show full text]
  • Social Network Analysis in the Study of Terrorism and Insurgency: from Organization to Politics," Int
    Zech, S.T., and M. Gabbay, "Social network analysis in the study of terrorism and insurgency: From organization to politics," Int. Stud. Rev., 18, 214-243, doi:10.1093/isr/viv011, 2016. http://isr.oxfordjournals.org/content/18/2/214 Social Network Analysis in the Study of Terrorism and Insurgency: From Organization 1 to Politics STEVEN T. ZECH The University of Denver The University of Washington AND MICHAEL GABBAY The University of Washington Research using social network analysis to study terrorism and insurgency has increased dramatically following the 9/11 attacks against the United States. This research emphasizes the importance of relational analysis and provides a variety of concepts, theories, and analytical tools to better understand questions related to militant group behavior and outcomes of terrorism and insurgent violence. This paper defines key network concepts, identifies important network metrics, and reviews theoretical and empirical research on network analysis and militant groups. We find that the main focus of existing research is on organizational analysis and its implications for militant group operational processes and performance. Few studies investigate how differences in network structure lead to divergent outcomes with respect to political processes such as militant group infighting, their strategic use of violence, or how politically salient variables affect the evolution of militant cooperative networks. Consequently, we propose a research agenda aimed at using network analysis to investigate the political interactions of militant groups within a single conflict and provide illustrations on how to pursue this agenda. We believe that such research will be of particular value in advancing the understanding of fragmented civil wars and insurgencies consisting of multiple, independent militant groups.
    [Show full text]
  • The American Militia Phenomenon: a Psychological
    THE AMERICAN MILITIA PHENOMENON: A PSYCHOLOGICAL PROFILE OF MILITANT THEOCRACIES ____________ A Thesis Presented to the Faculty of California State University, Chico ____________ In Partial Fulfillment of the Requirements for the Degree Master of Arts in Political Science ____________ by © Theodore C. Allen 2009 Summer 2009 PUBLICATION RIGHTS No portion of this thesis may be reprinted or reproduced in any manner unacceptable to the usual copyright restrictions without the written permission of the author. iii TABLE OF CONTENTS PAGE Publication Rights ...................................................................................................... iii Abstract....................................................................................................................... vi CHAPTER I. Introduction.............................................................................................. 1 II. Literature Review of the Modern Militia Phenomenon ........................... 11 Government Sources .................................................................... 11 Historical and Scholarly Works.................................................... 13 Popular Media .............................................................................. 18 III. The History of the Militia in America...................................................... 23 The Nexus Between Religion and Race ....................................... 28 Jefferson’s Wall of Separation ..................................................... 31 Revolution and the Church..........................................................
    [Show full text]
  • Evolution Through Revolution? the Syrian Muslim Brotherhood and the Syrian Uprising
    University of Leeds School of Politics and International Studies Evolution through Revolution? The Syrian Muslim Brotherhood and the Syrian Uprising Sumaya Gamal El Din Nasser Submitted in accordance with the requirement for the degree of Doctor of Philosophy December 2017 I confirm that the work submitted is my own and that appropriate credit has been given where reference has been made to the work of others. This copy has been supplied on the understanding that it is copyright material and that no quotation from the thesis may be published without proper acknowledgement. © 2017 The University of Leeds and Sumaya Gamal El Din Nasser The right of Sumaya Gamal El Din Nasser to be identified as Author of this work has been asserted by her in accordance with the Copyright, Designs and Patents Act 1988. 1 Acknowledgment First of all, I would like to reflect on the blessing of getting the opportunity to go through the experience of writing a thesis at a time when all eyes were focused on the Syrian crisis. It is a true privilege to have had the chance to examine such a sensitive and important topic at my age and using my long years of experience which I gathered through living in many different countries and integrating in different cultures and communities. I would like to extend a heart-felt thank you to my incredible husband Abdul-Malek who stood behind my achievements and continued to facilitate for me to keep going even when times getting tough. His passion to work for his beloved, war-torn Syria has never ceased to inspire me and I am so proud of the steps we have walked together.
    [Show full text]
  • Guerilla Warfare & Law Enforcement
    Journal of Strategic Security Volume 2 Number 4 Volume 2, No. 4: November/ Article 4 December 2009 Guerilla Warfare & Law Enforcement: Combating the 21st Century Terrorist Cell within the U.S. Richard J. Hughbank Extreme Terrorism Consulting, LLC & Counterinsurgency Training Center, [email protected] Follow this and additional works at: https://scholarcommons.usf.edu/jss Part of the Defense and Security Studies Commons, National Security Law Commons, and the Portfolio and Security Analysis Commons pp. 39-52 Recommended Citation Hughbank, Richard J.. "Guerilla Warfare & Law Enforcement: Combating the 21st Century Terrorist Cell within the U.S.." Journal of Strategic Security 2, no. 4 (2010) : 39-52. DOI: http://dx.doi.org/10.5038/1944-0472.2.4.4 Available at: https://scholarcommons.usf.edu/jss/vol2/iss4/4 This Article is brought to you for free and open access by the Open Access Journals at Scholar Commons. It has been accepted for inclusion in Journal of Strategic Security by an authorized editor of Scholar Commons. For more information, please contact [email protected]. Guerilla Warfare & Law Enforcement: Combating the 21st Century Terrorist Cell within the U.S. Abstract Both domestic and international terrorist organizations employ guerrilla warfare tactics, techniques, and procedures. Thus, the ability to identify and defeat the members of these organizations, cripple their infrastructures, and disrupt their financial resources lies in the understanding of modern guerrilla warfare as it develops in the twenty-first century within the United States.3 The forms of asymmetric warfare4 adopted by domestic and international terrorist groups alike is no longer intended to gain simple media exposure or governmental manipulation; they want to make an overpowering impact by causing massive loss of life and severe damage to infrastructure and are often motivated by religious imperatives and political goals.
    [Show full text]
  • Islamists, Religion, and the Revolution in Syria
    Islamists, Religion, and the Revolution in Syria Mohammad Abu Rumman ΔϴϤηΎϬϟ΍ΔϴϧΩέϷ΍ΔϜϠϤϤϟ΍ ΔϴϨρϮϟ΍ΔΒΘϜϤϟ΍Γή΋΍ΩϯΪϟω΍ΪϳϹ΍Ϣϗέ (2013/9/3259) ή˷ΒόϳϻϭϪϔϨμϣϯϮΘΤϣϦϋΔϴϧϮϧΎϘϟ΍ΔϴϟϭΆδϤϟ΍ϞϣΎϛϒϟΆϤϟ΍ϞϤΤΘϳ ϯήΧ΃ΔϴϣϮϜΣΔϬΟϱ΃ϭ΃ϪϴϨρϮϟ΍ΔΒΘϜϤϟ΍Γή΋΍Ωϱ΃έ ϦϋϒϨμϤϟ΍΍άϫ Imprint Published in 2013 by Friedrich-Ebert-Stiftung, FES Jordan & Iraq / FES Syria FES Jordan & Iraq P.O. Box 941876 Amman 11194, Jordan Email: [email protected] Website: www.fes-jordan.org FES Syria P.O. Box 116107 Riad El Solh Beirut 1107 2210, Lebanon Not for sale. © FES Jordan & Iraq / FES Syria All rights reserved. No part of this publication may be reprinted, reproduced or utilized in any form or by any means without prior written permission from the publishers. The views and opinions expressed in this publication are solely those of the original authors. They do not necessarily represent those of the Friedrich-Ebert-Stiftung or the editor. Translation: Dr. Hassan Barari Editing: Anja Wehler-Schoeck Cover: Ramzi al-Arabi Printing: Economic Printing Press ISBN: 978-9957-484-26-2 2 Foreword In the current fall of 2013, not a single day passes by without the crisis in Syria making new headlines. The international community has demonstrated indecision regarding concerted strategic action in the face of Bashar al-Assad’s brutal acts against the Syrian population. Meanwhile, the subsequent refugee crisis is heavily impacting Syria’s neighboring countries Jordan, Turkey, Lebanon and to a lesser extent Iraq. In the two latter, the political implications of what is turning more and more into a proxy war are felt the strongest and contribute to the increasing instability of both countries.
    [Show full text]
  • RSCAS 2017/28 Islamic Terrorism in the West and International Migrations
    RSCAS 2017/28 Robert Schuman Centre for Advanced Studies Islamic Terrorism in the West and International Migrations: The “Far” or “Near” Enemy Within? What is the Evidence Maria do Céu Pinto Arena European University Institute Robert Schuman Centre for Advanced Studies Islamic Terrorism in the West and International Migrations: The “Far” or “Near” Enemy Within? What is the Evidence Maria do Céu Pinto Arena EUI Working Paper RSCAS 2017/28 This text may be downloaded only for personal research purposes. Additional reproduction for other purposes, whether in hard copies or electronically, requires the consent of the author(s), editor(s). If cited or quoted, reference should be made to the full name of the author(s), editor(s), the title, the working paper, or other series, the year and the publisher. ISSN 1028-3625 © Maria do Céu Pinto Arena, 2017 Printed in Italy, May 2017 European University Institute Badia Fiesolana I – 50014 San Domenico di Fiesole (FI) Italy www.eui.eu/RSCAS/Publications/ www.eui.eu cadmus.eui.eu Robert Schuman Centre for Advanced Studies The Robert Schuman Centre for Advanced Studies (RSCAS), created in 1992 and directed by Professor Brigid Laffan, aims to develop inter-disciplinary and comparative research and to promote work on the major issues facing the process of integration and European society. The Centre is home to a large post-doctoral programme and hosts major research programmes and projects, and a range of working groups and ad hoc initiatives. The research agenda is organised around a set of core themes and is continuously evolving, reflecting the changing agenda of European integration and the expanding membership of the European Union.
    [Show full text]