Part I Historical Foundation

Total Page:16

File Type:pdf, Size:1020Kb

Part I Historical Foundation PART I HISTORICAL FOUNDATION Ch 1 The Problem of Terrorism, 3 Ch 2 Terrorist Methods and Weapons, 43 CHAPTER 1 THE PROBLEM OF TERRORISM OBJECTIVES The study of this chapter will enable you to: 1. Trace the history of terrorism. 2. Examine the connection among religion, politics, and terrorism. 3. Appreciate the difficulty in defining terrorism. 4. List, explain, and compare typologies of terrorism. 5. Discuss the explanations and causes of terrorism. 6. Describe international terrorism. 7. Describe domestic terrorism. KEY TERMS Sicarii Shiite Zealots Crusades Assassins domestic terrorism Thugees international terrorism French Revolution classical ideological continuum Reign of Terror right-wing extremism Ku Klux Klan left-wing extremism state terrorism dissident terrorism guerrilla warfare genocide Palestinian Liberation Organization psychopathic personality disorder Fundamentalism social learning models Islam rational choice approach Prophet Muhammad structural theories Muslims multiple marginality theory Allah relative deprivation theory Jesus globalization Koran asymmetrical warfare bible Abu Nidal organization Jihad HAMAS Sunni Hizballah 3 4 Terrorism and Homeland Security KEY TERMS al-Qaida extremism internal state terrorism Ruby Ridge incident external state terrorism Christian Identity anarchism Waco incident ecoterrorism Oklahoma City bombing Animal Liberation Front Patriot movement Earth Liberation Front THE 9/11 ATTACKS September 11, 2001 began as a typical workday in the United States. During the morning hours, com- muters from across the nation hurried to their jobs. Airports were busy as passengers boarded flights to distant cities. Unfortunately, four flights in particular would be remembered in American history as fatal flights resulting in almost 2800 deaths, scores of injuries, and billions of dollars in property damage because four teams of al-Qaida terrorists were able to hijack the planes. Two of the flights took off from Logan Airport in Boston bound for Los Angeles. One was United Airlines Flight 175 that departed at 7:58 AM. The other was right behind it, American Airlines Flight 11 that took off at 7:59 AM. After entering New York State, Flight 11 suddenly turned south, followed the Hudson River to New York City and then at 8:45 AM. slammed into the North Tower of the World Trade Center. Many first thought the crash was an accident, but 20 minutes later opinions changed when, as many eyes and cameras were focused on the disaster, Flight 175 struck the South Tower. The shocking video of Flight 175 disappearing inside the South Tower, with an explosion on the opposite side, seemed surrealistic. Each jet was traveling about 300 mph and carrying about 60,000 lbs. of fuel upon impact. Witnesses on the street were shocked as both 110-story office buildings were burning and bodies, body parts, furni- ture, and assorted debris fell to the ground. Some leaped to their deaths or were thrown out by the explosions from the jet fuel. One man tried to climb down the outside of the building, was successful at first, but lost his grip and fell to his death. As office workers scrambled down the stairs to escape, many had horrendous injuries. Several were badly burned with skin peeling off their body as they some- how found the strength to keep moving. Those trapped in the floors above the fires had no choice but to pray and await their fate. As the intense heat bent the steel supporting the buildings, upper floors began to collapse onto lower floors. Eventually, both towers came crashing down, killing those trying to escape and the brave rescue workers (Figure 1-1). A third flight involved in the attack, United Airlines Flight 93, took off from Newark International Airport at 8:01 AM en route to San Francisco. Near Cleveland, the flight abruptly headed toward Pittsburgh. Passengers on this flight had used their cell phones to talk to love ones who informed the passengers about the other attacks. As brave passengers fought to take back the plane, it crashed nose-first in an empty field 80 miles from Pittsburgh at 10:10 AM, killing all those on board. We can only imagine the struggle that ensued before the crash as passengers tried to save their lives. It was surmised that the target of this flight was the White House or the U.S. Capitol building. The fourth plane, Flight 77, departed from Dulles International Airport in Virginia at 8:10 AM and headed toward Los Angeles. In a dive toward the Pentagon, it struck at 9:40 AM, killing 189 people and injuring many. The 9/11 attacks are perhaps the most creative and most spectacular terrorist attacks that ever occurred in history. It is known that these suicide bombers were armed with box cutters, small knives and pepper spray, and claimed to have a bomb. Some passengers and crew had their throats slit as a way to terrorize and control the passengers and crew. The terrorists knew that the four planes would The Problem of Terrorism 5 THE 9/11 ATTACKS—Cont’d Figure 1-1 ■ Ground Zero (World Trade Center, New York City) following 9/11 Attacks. U.S. Navy photo by Photographer’s Mate 2nd Class Aaron Peterson. http://www.news.navy.mil/ view_single.asp?id=137 be fully loaded with fuel because of the cross-country destinations, thus transforming each plane into a powerful suicide bomb, something like a “poor person’s cruise missile.” The 19 hijackers in the four teams received various training in, for example, the martial arts and flight training. In summary, the ter- rorists were successful in infiltrating the United States, avoiding police and intelligence services, coor- dinating and executing their plan, and bringing al-Qaida and its goals to the attention of the global community. At the same time, al-Qaida underestimated the reaction of the global community to the attacks. It unleashed a global war against terrorism and two regimes fell (Afghanistan and Iraq) from military action, primarily by the United States. THE HISTORY OF TERRORISM Terrorism has a long history. Interestingly, early examples of terrorism have roots in religious convictions (Laqueur, 2001; Rapoport, 1984). Ancient terrorists were “holy warriors” as we see with certain terrorists today. During the first century in the Middle East, the Sicarii and the Zealots, Jewish groups in ancient Palestine, fomented revolution against the occupying forces 6 Terrorism and Homeland Security of Rome. The Sicarii instilled fear by using a dagger to stab Romans and Roman sympathizers during the day at crowded holiday festivities. The throngs provided cover for the killers and heightened terror because people never knew when an attacker would strike. The Zealots–Sicarii believed that by confronting the Romans, the Messiah would intervene and save the Jewish people. Between 66 and 70 AD, revolution became a reality. However, it ended in disaster for the Zealots–Sicarii. With thousands of Jews killed and the Jewish state in shambles, the survivors fled to the top of Masada where their abhorrence to being subjected to control by the Romans, who surrounded them, resulted in mass suicide. Today, we have the term “zealot,” meaning fanatical partisan. In analyzing the methods of the Zealot–Sicarii, and drawing parallels to modern-day terrorism, Poland (2005: 26–27) writes that “the primary purpose of the Sicarii terrorist strategy, like so many terrorist groups today, seems to be the provocation of indiscriminate countermeasures by the established political system and to deliberately provoke repression, reprisals, and counterterrorism.” Poland refers to Northern Ireland where, for hundreds of years, Catholics have battled Protestants. Simonsen and Spindlove (2004: 70–75) explain that during the 16th century, James I, King of England, offered land in Ireland to Scottish settlers for the purpose of establishing the Protestant church in Ireland. Conflict ensued with Catholics, but the Protestant landowners prevailed. Catholics were regulated to a life of poverty. Poland cites incidents during the 20th cen- tury when Catholics, protesting peacefully against Protestants and British rule, were killed and wounded when police and British Security Forces overreacted. In one illegal march, on January 30, 1972, thirteen people were killed and twelve were wounded. A government investiga- tion blamed demonstrators for creating a highly dangerous situation leading to inevitable violence. The deliberate provocation resulted in retaliation by the Provisional Irish Republican Army against Protestants and the British Army. Scores were killed or wounded by bombings and shootings. Poland draws another parallel from the Zealot–Sicarii movement to recent times. The Irgun Zvai Leumi-al-Israel, led by Menachem Begin, terrorized the British military government of Palestine between 1942 and 1948 in an effort to establish a Jewish state. The Irgun perpetrated many bombings and assassinations, leading to a cycle of terror and counterterror. Manifestos of the Irgun argued “No Masada.” Irgun fighters had actually studied terrorist methods of the Sicarii and the Irish Republican Army. Eventually, the British turned the problem over to the United Nations, and in 1948, the country of Israel was born. The Assassins were another religious sect that used terrorism to purse their goals (Weinzierl, 2004: 31–32). This group gave us the term “assassin,” which literally means “hashish-eater,” a ref- erence to the drug taking that allegedly occurred (perhaps rumor) prior to murdering someone. During the 11th and 12th centuries, this group evolved from the Shiites of the present-day Mideast and they believed that the Muslim community needed the purified version of Islam to prepare for the arrival of the Inman, the Chosen of God and leader of mankind. The Assassins waged a war against the majority Sunni Muslim population. Their terror strategies consisted of using uncon- ventional means, establishing mountain fortifications from which terror attacks were launched, and using daggers like the Sicarii. Although the Assassins were not successful in reforming the Islamic faith or in recruiting many converts, they are remembered for their innovations in terror- ist strategies, namely the suicide mission and using disguise and deception.
Recommended publications
  • Terrorism As a Global Peril: a Kenyan Scenario Tactic
    International Journal of Social Science and Technology Vol. 3 No. 5 August 2018 Terrorism as a Global Peril: A Kenyan Scenario Tactic Mongare A. B. LLB, MBA, LLM University of Nairobi The Catholic University of Eastern Africa, The Faculty of Law/Advocates Training Programme KSL, Nairobi, Kenya [email protected] Abstract There is a global concern over terrorism threats due to its very nature of causing physical destruction of human and infrastructure. Resultantly, anguish is experienced through economic loss, insecurity and generally to social disorder to the polity whose effects cannot be accentuated. The paper interests itself with the Kenyan techniques on counter-terrorism. The status quo is worsened by a dearth of a universal definition of terrorism. Most countries in Sub-Saharan Africa are roiled in civil clashes and there has been a polemic on how to deal with the perpetrators of this conflicts; Kenya has remained relatively peaceful for decades and played host to countless evacuees fleeing neighbouring countries. Nevertheless, since 1998, terrorism-related activities have been on the upsurge in the country posing a major threat to national security and development. The scenery of terrorist activities in Kenya has been varying and growing in monstrousness, leaving numerous innocent citizens as victims, while in some incidences, the country has continuously been held at ransom by the terror groups. Though Kenya has put up a concerted fight to prize fight terror it has turned out to be an easy target for terror groups for close to twenty years. Kenya’s counter-terrorism exertions, nonetheless, cannot be undervalued but they have faced a lot of criticism.
    [Show full text]
  • Somalia Terror Threat
    THECHRISTOPHER TERROR February 12, THREAT FROM THE TERROR THREAT FROM SOMALIA THE INTERNATIONALIZATION OF AL SHABAAB CHRISTOPHER HARNISCH APPENDICES AND MAPS BY KATHERINE ZIMMERMAN FEBRUARY 12, 2010 A REPORT BY THE CRITICAL THREATS PROJECT OF THE AMERICAN ENTERPRISE INSTITUTE THE TERROR THREAT FROM SOMALIA CHRISTOPHER HARNISCH February 12, 2010 Contents EXECUTIVE SUMMARY 1 IMPORTANT GROUPS AND ORGANIZATIONS IN SOMALIA 3 NOTABLE INDIVIDUALS 4 INTRODUCTION 8 ORIGINS OF AL SHABAAB 10 GAINING CONTROL, GOVERNING, AND MAINTAINING CONTROL 14 AL SHABAAB’S RELATIONSHIP WITH AL QAEDA, THE GLOBAL JIHAD MOVEMENT, AND ITS GLOBAL IDEOLOGY 19 INTERNATIONAL RECRUITING AND ITS IMPACT 29 AL SHABAAB’S INTERNATIONAL THREATS 33 THREAT ASSESSMENT AND CONCLUSION 35 APPENDIX A: TIMELINE OF MAJOR SECURITY EVENTS IN SOMALIA 37 APPENDIX B: MAJOR SUICIDE ATTACKS AND ASSASSINATIONS CLAIMED BY OR ATTRIBUTED TO AL SHABAAB 47 NOTES 51 Maps MAP OF THE HORN OF AFRICA AND MIDDLE EAST 5 POLITICAL MAP OF SOMALIA 6 MAP OF ISLAMIST-CONTROLLED AND INFLUENCED AREAS IN SOMALIA 7 www.criticalthreats.org THE TERROR THREAT FROM SOMALIA CHRISTOPHER HARNISCH February 12, 2010 Executive Summary hree hundred people nearly died in the skies of and assassinations. Al Shabaab’s primary objectives at TMichigan on Christmas Day, 2009 when a Niger- the time of the Ethiopian invasion appeared to be ian terrorist attempted to blow up a plane destined geographically limited to Somalia, and perhaps the for Detroit. The terrorist was an operative of an al Horn of Africa. The group’s rhetoric and behavior, Qaeda franchise based in Yemen called al Qaeda in however, have shifted over the past two years reflect- the Arabian Peninsula (AQAP).
    [Show full text]
  • Assessing the Vulnerability of Kenyan Youths to Radicalisation and Extremism
    Institute for Security Studies PAPER Assessing the vulnerability of Kenyan youths to radicalisation and extremism INTRODUCTION country is also central to the region and thus deserves That there is an emerging trend of religious radicalisation in closer scrutiny. Although Kenya’s intervention in Somalia East Africa is not in doubt. Somalia, which has experienced served to incite a terrorist response, the experience of various forms of conflict since 1991, has often been seen Uganda, Ethiopia and Burundi, all of which have had troops as the source of extremism in the region, especially in Somalia since 2006, showed different trends. Only the following the attacks on the United States (US) embassies attacks in Uganda and Kenya were attributed to those in Dar es Salaam and Nairobi on 7 August 1998. Yet closer countries’ interventions in Somalia. And, despite the fact investigation reveals that Somali nationals were not behind that those directly involved in these attacks were Ugandan most of the incidents outside Somalia’s borders. Somalia nationals, Kenyans and Tanzanians helped plan and provides a safe haven, training camps and opportunities for execute the attacks, not members of traditional extremists to fight the ‘enemies of Islam’, but al-Qaeda and Somali communities. later al-Shabaab have executed attacks in the region by This is not to say that individuals within the traditional relying on local assistance and support. At the same time, Muslim community have not used frustrations and al-Shabaab managed to recruit Kenyan, Ugandan and vulnerabilities among the youth – Muslim and non-Muslim Tanzanian nationals to its ranks in Somalia.
    [Show full text]
  • 11 July 2006 Mumbai Train Bombings
    11 July 2006 Mumbai train bombings July 2006 Mumbai train bombings One of the bomb-damaged coaches Location Mumbai, India Target(s) Mumbai Suburban Railway Date 11 July 2006 18:24 – 18:35 (UTC+5.5) Attack Type Bombings Fatalities 209 Injuries 714 Perpetrator(s) Terrorist outfits—Student Islamic Movement of India (SIMI), Lashkar-e-Toiba (LeT; These are alleged perperators as legal proceedings have not yet taken place.) Map showing the 'Western line' and blast locations. The 11 July 2006 Mumbai train bombings were a series of seven bomb blasts that took place over a period of 11 minutes on the Suburban Railway in Mumbai (formerly known as Bombay), capital city of the Indian state of Maharashtra and India's financial capital. 209 people lost their lives and over 700 were injured in the attacks. Details The bombs were placed on trains plying on the western line of the suburban ("local") train network, which forms the backbone of the city's transport network. The first blast reportedly took place at 18:24 IST (12:54 UTC), and the explosions continued for approximately eleven minutes, until 18:35, during the after-work rush hour. All the bombs had been placed in the first-class "general" compartments (some compartments are reserved for women, called "ladies" compartments) of several trains running from Churchgate, the city-centre end of the western railway line, to the western suburbs of the city. They exploded at or in the near vicinity of the suburban railway stations of Matunga Road, Mahim, Bandra, Khar Road, Jogeshwari, Bhayandar and Borivali.
    [Show full text]
  • Estimated Age
    The US National Counterterrorism Center is pleased to present the 2016 edition of the Counterterrorism (CT) Calendar. Since 2003, we have published the calendar in a daily planner format that provides our consumers with a variety of information related to international terrorism, including wanted terrorists; terrorist group fact sheets; technical issue related to terrorist tactics, techniques, and procedures; and potential dates of importance that terrorists might consider when planning attacks. The cover of this year’s CT Calendar highlights terrorists’ growing use of social media and other emerging online technologies to recruit, radicalize, and encourage adherents to carry out attacks. This year will be the last hardcopy publication of the calendar, as growing production costs necessitate our transition to more cost- effective dissemination methods. In the coming years, NCTC will use a variety of online and other media platforms to continue to share the valuable information found in the CT Calendar with a broad customer set, including our Federal, State, Local, and Tribal law enforcement partners; agencies across the Intelligence Community; private sector partners; and the US public. On behalf of NCTC, I want to thank all the consumers of the CT Calendar during the past 12 years. We hope you continue to find the CT Calendar beneficial to your daily efforts. Sincerely, Nicholas J. Rasmussen Director The US National Counterterrorism Center is pleased to present the 2016 edition of the Counterterrorism (CT) Calendar. This edition, like others since the Calendar was first published in daily planner format in 2003, contains many features across the full range of issues pertaining to international terrorism: terrorist groups, wanted terrorists, and technical pages on various threat-related topics.
    [Show full text]
  • NCTC Annex of the Country Reports on Terrorism 2008
    Country Reports on Terrorism 2008 April 2009 ________________________________ United States Department of State Publication Office of the Coordinator for Counterterrorism Released April 2009 Page | 1 Country Reports on Terrorism 2008 is submitted in compliance with Title 22 of the United States Code, Section 2656f (the ―Act‖), which requires the Department of State to provide to Congress a full and complete annual report on terrorism for those countries and groups meeting the criteria of the Act. COUNTRY REPORTS ON TERRORISM 2008 Table of Contents Chapter 1. Strategic Assessment Chapter 2. Country Reports Africa Overview Trans-Sahara Counterterrorism Partnership The African Union Angola Botswana Burkina Faso Burundi Comoros Democratic Republic of the Congo Cote D‘Ivoire Djibouti Eritrea Ethiopia Ghana Kenya Liberia Madagascar Mali Mauritania Mauritius Namibia Nigeria Rwanda Senegal Somalia South Africa Tanzania Uganda Zambia Zimbabwe Page | 2 East Asia and Pacific Overview Australia Burma Cambodia China o Hong Kong o Macau Indonesia Japan Republic of Korea (South Korea) Democratic People‘s Republic of Korea (North Korea) Laos Malaysia Micronesia, Federated States of Mongolia New Zealand Papua New Guinea, Solomon Islands, or Vanaatu Philippines Singapore Taiwan Thailand Europe Overview Albania Armenia Austria Azerbaijan Belgium Bosnia and Herzegovina Bulgaria Croatia Cyprus Czech Republic Denmark Estonia Finland France Georgia Germany Greece Hungary Iceland Ireland Italy Kosovo Latvia Page | 3 Lithuania Macedonia Malta Moldova Montenegro
    [Show full text]
  • On the TRAIL N°17
    Information and analysis bulletin on animal poaching and smuggling n°17 / Events from the 1st April to the 30 of June 2017 Published on July 31, 2017 Original version in French Contents Seahorses 4 Pangolins 40 Corals 4 Pangolins and Elephants 43 Abalones, Queen Conches, Primates 44 Horse’s Hoof Clams and Trochus 4 Guanacos and Vicuñas 53 Sea Cucumbers 6 Felines 54 Fishes 8 Leopards and Elephants 67 Requiem for the Vaquitas 11 Wolves 69 Marine Mammals 13 Bears 70 Marine Turtles 16 Hippopotamuses 71 Various Marine Species 18 Hippopotamuses and Elephants 71 Rhinoceroses 72 Tortoises and Freshwater Turtles 19 Laikipia County, Kenya 85 Snakes 23 Rhinos and Elephants 87 Sauria 24 Elephants 88 Crocodilians 25 It’s moving 106 Various Reptile Species 27 Elephants and Mammoths 108 Amphibians 28 Other Mammals 108 Insects and Arachnids 28 Multi-Species 112 Birds 29 Donkeys 124 1 On the Trail #17. Robin des Bois/Robin Hood Carried out by Robin des Bois (Robin Hood) with the support of : reconnue d’utilité publique 28, rue Vineuse - 75116 Paris Tél : 01 45 05 14 60 www.fondationbrigittebardot.fr and of the Ministry of Ecological and Solidarity Transition, France Previous issues n°16 / 1st January - 31th March 2017 http://www.robindesbois.org/wp-content/uploads/ON_THE_TRAIL_16.pdf (pdf - 116 p. 5.1 Mo) n°15 / 1st October - 31th December 2016 http://www.robindesbois.org/wp-content/uploads/ON_THE_TRAIL_15.pdf (pdf - 112 p. 6 Mo) n°14 / 1st July - 30th September 2016 http://www.robindesbois.org/wp-content/uploads/ON_THE_TRAIL_14.pdf (pdf - 112 p. 6.7 Mo) Special Edition – 66th IWC - October 2016 (pdf 10 p.
    [Show full text]
  • Doc 7281 290 En.Pdf
    Department of State Publication 11038 Office of the Secretary of State Office of the Coordinator for Counterterrorism Internet address: http//www.state.gov/s/ct/rls/ Released April 2003 United States Department of State April 2003 © Reuters In a speech at the Jimmy Doolittle Flight Facility in Columbia, South Carolina, on 24 October 2002, President George W. Bush promised to prosecute the war on terror with “patience, focus, and determination.” i* Introduction by Ambassador Cofer Black Coordinator for Counterterrorism The evil of terrorism continued to plague the world throughout 2002, from Bali to Grozny to Mombasa. At the same time, the global war against the terrorist threat was waged intensively in all regions with encouraging results. The year saw the liberation of Afghanistan by Coalition forces, the expulsion of al-Qaida and the oppressive Taliban regime, the destruction of their terrorist training infrastructure, and the installation of a transitional government committed to democracy and economic development. Al-Qaida terrorists are on the run, and thousands of them have been detained. More than one third of al-Qaida’s top leadership has been killed or captured, including some who conspired in the September 11 attacks, the 2000 attack on the USS Cole, and the 1998 bombings of two US Embassies in East Africa. Moreover, the global antiterrorism coalition that was forged in the immediate aftermath of the September 11 attacks in the United States remains united. The world is fighting terrorism on five fronts: diplomatic, intelligence, law enforcement, financial, and military. Diplomatic The progress that has been achieved in the global war on terrorism would not have been possible without intense diplomatic engagement throughout the world.
    [Show full text]
  • Israel, Middle East
    Review of the Year OTHER COUNTRIES Israel and the Middle East Israel X HE VIOLENCE THAT BEGAN in late 2000 and continued all through 2001—featuring Palestinian suicide bombings aimed at pro- ducing a maximum of Israeli casualties, and Israeli reprisals—did not abate in 2002; in fact, it intensified. Tough new measures by the Likud- led coalition, including stepped-up "targeted killings'1 of terror kingpins and large-scale incursions into Palestinian areas—such as Operation De- fensive Shield in the spring—brought only temporary halts to the attacks on Israelis and sharp criticism from around the world. An exception to the unsympathetic attitude toward Israel in world cap- itals was that of the American government. Although President George W. Bush became the first president explicitly to call for a Palestinian state, he delivered a speech on June 24 announcing that the Palestinian National Authority would have to undergo democratization, renounce terror, and select new leadership (that is, not Yasir Arafat) first. Toward the end of the year, with a U.S. strike on Iraq looming, the U.S., the UN, the European Union (EU), and the chief European powers promoted a "road map," charting steps that Israel and the Palestinians might take to reach an ultimate settlement. The security crisis loomed large over Israeli life. The economy, already hard-hit by more than a year of violence, suffered further blows. And while the Labor Party left the coalition and brought down the government on October 30 ostensibly over a budgetary matter, what was really at stake was whether Labor could devise a strategy for stopping the bloodshed that would be both different from Likud's and convincing to the voters.
    [Show full text]
  • Crimes Committed by Terrorist Groups: Theory, Research and Prevention
    The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Crimes Committed by Terrorist Groups: Theory, Research and Prevention Author(s): Mark S. Hamm Document No.: 211203 Date Received: September 2005 Award Number: 2003-DT-CX-0002 This report has not been published by the U.S. Department of Justice. To provide better customer service, NCJRS has made this Federally- funded grant final report available electronically in addition to traditional paper copies. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. Crimes Committed by Terrorist Groups: Theory, Research, and Prevention Award #2003 DT CX 0002 Mark S. Hamm Criminology Department Indiana State University Terre Haute, IN 47809 Final Final Report Submitted: June 1, 2005 This project was supported by Grant No. 2003-DT-CX-0002 awarded by the National Institute of Justice, Office of Justice Programs, U.S. Department of Justice. Points of view in this document are those of the author and do not necessarily represent the official position or policies of the U.S. Department of Justice. This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. TABLE OF CONTENTS Abstract .............................................................. iv Executive Summary....................................................
    [Show full text]
  • ISS Paper 245 Kenya Youth.Indd
    Institute for Security Studies PAPER Assessing the vulnerability of Kenyan youths to radicalisation and extremism INTRODUCTION country is also central to the region and thus deserves That there is an emerging trend of religious radicalisation in closer scrutiny. Although Kenya’s intervention in Somalia East Africa is not in doubt. Somalia, which has experienced served to incite a terrorist response, the experience of various forms of conflict since 1991, has often been seen Uganda, Ethiopia and Burundi, all of which have had troops as the source of extremism in the region, especially in Somalia since 2006, showed different trends. Only the following the attacks on the United States (US) embassies attacks in Uganda and Kenya were attributed to those in Dar es Salaam and Nairobi on 7 August 1998. Yet closer countries’ interventions in Somalia. And, despite the fact investigation reveals that Somali nationals were not behind that those directly involved in these attacks were Ugandan most of the incidents outside Somalia’s borders. Somalia nationals, Kenyans and Tanzanians helped plan and provides a safe haven, training camps and opportunities for execute the attacks, not members of traditional extremists to fight the ‘enemies of Islam’, but al-Qaeda and Somali communities. later al-Shabaab have executed attacks in the region by This is not to say that individuals within the traditional relying on local assistance and support. At the same time, Muslim community have not used frustrations and al-Shabaab managed to recruit Kenyan, Ugandan and vulnerabilities among the youth – Muslim and non-Muslim Tanzanian nationals to its ranks in Somalia.
    [Show full text]
  • Catherine De Bolle, Executive Director, Europol EDITORIAL BOARD Paul Cruickshank Colonel Suzanne Nielsen, Ph.D
    OBJECTIVE ·· RELEVANT ·· RIGOROUS || JUNE/JULYJULY 2019 · 2018VOLUME · VOLUME 12, ISSUE 11, ISSUE6 6 FEATURE ARTICLE A VIEW FROM THE CT FOXHOLE A VIEW FROM THE CT FOXHOLE TheThe Dusit Jihadi Hotel Threat Attack and the Evolving Terror LTC(R)Catherine Bryan Price Threatto Indonesia in East Africa De Bolle Former Director, Matt BrydenKirsten and E. Premdeep Schulze Bahra ExecutiveCombating Director, Terrorism EuropolCenter FEATURE ARTICLE 1 East Africa's Terrorist Triple Helix: The Dusit Hotel Attack and the Historical Editor in Chief Evolution of the Jihadi Threat Paul Cruickshank Matt Bryden and Premdeep Bahra Managing Editor INTERVIEW Kristina Hummel 12 A View from the CT Foxhole: Catherine De Bolle, Executive Director, Europol EDITORIAL BOARD Paul Cruickshank Colonel Suzanne Nielsen, Ph.D. Department Head ANALYSIS Dept. of Social Sciences (West Point) 18 The Christchurch Attacks: Livestream Terror in the Viral Video Age Brian Dodwell Graham Macklin Director, CTC 30 From Daesh to 'Diaspora' II: The Challenges Posed by Women and Minors After the Fall of the Caliphate Don Rassler Joana Cook and Gina Vale Director of Strategic Initiatives, CTC 46 The Terrorist Threat to Europe from Frustrated Travelers Robin Simcox CONTACT Combating Terrorism Center U.S. Military Academy 607 Cullum Road, Lincoln Hall In our cover article, Matt Bryden and Premdeep Bahra trace the evolution West Point, NY 10996 of the jihadi terrorist threat in East Africa over the last three decades. They Phone: (845) 938-8495 argue that al-Shabaab’s January 2019 attack on the Dusit D2 luxury hotel compound in Nairobi, Kenya, “brought together three strands of al-Shabaab’s organizational DNA: Email: [email protected] its So mali provenance, its ideological affiliation with al-Qa`ida, and its growing cohort of trained, Web: www.ctc.usma.edu/sentinel/ experienced East African fighters.
    [Show full text]