Counter-Radicalization

Total Page:16

File Type:pdf, Size:1020Kb

Counter-Radicalization COUNTER-RADICALIZATION: COMBATING TERRORISM AT THE CORE A STUDY OF THE MOTIVATIONS AND INSPIRATIONAL LEADERS BEHIND RADICALIZATION TO VIOLENT EXTREMISM AND THE PROGRAMS DESIGNED TO COMBAT THEM by Jennifer S. Hendrickson A thesis submitted to Johns Hopkins University in conformity with the requirements for the degree of Master of Arts in Global Security Studies Baltimore, Maryland August 2014 © 2014 Jennifer Hendrickson All Rights Reserved ABSTRACT Radicalization to violent extremism is a critical threat to both national and global security. This thesis examines three aspects of radicalization to violent Islamic extremism and the related counter-radicalization efforts. The first chapter examines what motivations prompt women to radicalize to violent extremism and analyzes the applicability of several leading theories on motivations to four Western female case studies. In this chapter, I hypothesized that the women would exhibit motivations related more to political and religious drivers due to the relatively conflict-free setting and neutral gender roles in the West; however, the results indicate trauma/secondary traumatization and the associated revenge are significant motivators, and uniquely female motivations to restore honor should not be disregarded as a possible motive. The second chapter explores the characteristics that make leaders influential and critical to the radicalization process through a case study analysis of Abdullah Azzam and Anwar al-Awlaki. I theorized that these leaders would demonstrate charisma, effective communication, and credibility despite being deceased, which the case study analysis confirmed with the exception of Azzam’s lack of cultural resonance. Using a case study comparison of three programs with different structures, the final chapter assesses whether a government connection has a negative impact on counter-radicalization programs, and if the type of government involved influences how the connection is perceived. I hypothesized that a government connection, particularly with a Western secular government, would negatively impact a program’s legitimacy. However, the case study results indicate that an apparent connection between the messengers and the government negatively impacts program legitimacy, not simply a government connection to the program as a whole. Also, the ii case study results reveal the type of government involved does have an impact when a connection is evident between the messengers and the government. Each of the chapters addresses policy implications related to counter-radicalization and specifically effective communication of a counter narrative. Thesis Advisors: Dr. Sarah O’Byrne, Dr. Rameez Abbas, Dr. Jacob Straus, Dr. Mark Stout iii Table of Contents LIST OF TABLES ................................................................................................................................. VI INTRODUCTION ................................................................................................................................... 1 THE FEMALE FRONT .............................................................................................................................................. 5 BATTLE FOR INFLUENCE ...................................................................................................................................... 7 BLAME THE MESSENGER ..................................................................................................................................... 8 BIBLIOGRAPHY ..................................................................................................................................................... 11 THE FEMALE FRONT: IMPETUSES TO EMBRACE VIOLENT EXTREMISM ........... 12 FEMALE RADICALIZATION THROUGHOUT THE LITERATURE ................................................................ 15 Political and Religious Drivers ..................................................................................................................... 18 Personal ................................................................................................................................................................. 20 METHODOLOGY FOR ANALYSIS OF FEMALE MOTIVATIONS ................................................................ 26 FEMALE VIOLENT EXTREMIST CASE STUDIES .......................................................................................... 27 Western Violent Extremists ........................................................................................................................... 29 DISCUSSION OF CASE STUDY FINDINGS AND THE RESULTING POLICY IMPLICATIONS ............... 41 CONCLUSION ......................................................................................................................................................... 45 BIBLIOGRAPHY ..................................................................................................................................................... 46 BATTLE FOR INFLUENCE: A STUDY OF THE CHARACTERISTICS OF INSPIRATIONAL TERRORIST LEADERS ................................................................................. 51 ASSESSING THE FIELD: LEADERSHIP ............................................................................................................. 53 Charisma ............................................................................................................................................................... 55 Effective Communication: Framing and Resonance ........................................................................... 58 Credibility and Authority ................................................................................................................................ 61 METHODOLOGY: STRUCTURED, FOCUSED CASE STUDY COMPARISON ........................................... 63 TERRORIST LEADER CASE STUDIES .............................................................................................................. 64 Anwar al-Awlaki ................................................................................................................................................ 65 Abdullah Azzam ................................................................................................................................................. 69 ANALYSIS AND DISCUSSION OF FINDINGS .................................................................................................. 72 Charisma: .............................................................................................................................................................. 72 Effective Communication: .............................................................................................................................. 75 Credibility: ............................................................................................................................................................ 77 POLICY IMPLICATIONS ....................................................................................................................................... 80 Targeted Killing of Terrorist Leaders ....................................................................................................... 80 Countering or Preventing Violent Extremism (CVE, PVE) Programs ......................................... 82 CONCLUSION ......................................................................................................................................................... 83 BIBLIOGRAPHY ..................................................................................................................................................... 84 BLAME THE MESSENGER: AN EXAMINATION OF COUNTER-RADICALIZATION PROGRAMS AND THE IMPACT OF A GOVERNMENT CONNECTION ........................ 89 ASSESSING THE FIELD: COUNTER-RADICALIZATION EFFORTS ............................................................ 91 METHODOLOGY: STRUCTURED, FOCUSED CASE STUDY COMPARISON .......................................... 96 CURRENT COUNTER-RADICALIZATION PROGRAMS ................................................................................. 97 Sakinah Campaign (Al-Sakina) ................................................................................................................... 98 Danish Security and Intelligence Service’s (PET) Dialogue Forum ........................................... 102 Quilliam ................................................................................................................................................................ 105 iv DISCUSSION OF CASE STUDY FINDINGS .................................................................................................... 110 Clarity of Government Connection ........................................................................................................... 110 Messengers .......................................................................................................................................................... 111 POTENTIAL POLICY IMPLICATIONS FOR THE UNITED STATES ........................................................... 113 CONCLUSION ....................................................................................................................................................... 115 BIBLIOGRAPHY ................................................................................................................................................... 117 CONCLUSION
Recommended publications
  • The Internet and the Radicalization of Muslim Women
    The Internet and the Radicalization of Muslim Women Sergio E. Sanchez California State University, Chico Department of Political Science Chico, CA 95929 [email protected] “to kill one and frighten 10,000 others” - Chinese Proverb Paper prepared for Presentation at the annual meeting of the Western Political Science Association, Seattle, WA, April 2014. Abstract The Internet, with its built in anonymity and continuous availability – 24 hours a day, seven days a week- is for some the perfect venue for chatting, meeting new people, learning about topics of interest, and a source for countless hours of entertainment. Moreover, the Internet allows individuals from all over the country, or the world, who are from different socioeconomic backgrounds but who share similar interests and ideologies to interact and communicate privately. However, the Internet is also a readymade platform for the spread of hate, terror, and other radical ideas and messages, all of which can be transmitted at the speed of light, anonymously, and available on demand. The Internet is, therefore, an ideal venue for women to interact with likeminded individuals or organizations without having to sacrifice or tarnish their standing in the community or among their families. Women from repressive countries such as Saudi Arabia, Egypt, and Palestine can participate in jihad without leaving their homes and without having to meet strange men face-to-face and, consequently, bring shame to their families or themselves – as per traditional Islamic practices. Likewise, women involved or interested in radical environmentalism can meet online, share ideas, and continue their struggle against governments and corporations. Similarly, women involved, or fascinated with, right-wing religious movements or hate groups such as the KKK or neo-Nazis can likewise meet in a private setting, virtually, with little concern that their reputations or image within the community will be tarnished by their surreptitious activities online.
    [Show full text]
  • The Female Jihadists of Europe
    Master’s Thesis 2018 30 ECTS Department of International Environment and Development Studies Main Supervisor: Anne Stenersen, Forsvarets forskingsinstitutt (FFI) The Female Jihadists of Europe Ida Louise Rudolph MSc International Relations Noragric The Department of International Environment and Development Studies, Noragric, is the international gateway for the Norwegian University of Life Sciences (NMBU). Established in 1986, Noragric’s contribution to international development lies in the interface between research, education (Bachelor, Master and PhD programmes) and assignments. The Noragric Master’s theses are the final theses submitted by students in order to fulfil the requirements under the Noragric Master’s programmes ‘International Environmental Studies’, ‘International Development Studies’ and ‘International Relations’. The findings in this thesis do not necessarily reflect the views of Noragric. Extracts from this publication may only be reproduced after prior consultation with the author and on condition that the source is indicated. For rights of reproduction or translation contact Noragric. © Ida Louise Rudolph, May 2018 [email protected] Noragric Department of International Environment and Development Studies The Faculty of Landscape and Society P.O. Box 5003 N-1432 Ås Norway Tel.: +47 67 23 00 00 Internet: https://www.nmbu.no/fakultet/landsam/institutt/noragric Declaration I, Ida Louise Rudolph, declare that this thesis is a result of my research investigations and findings. Sources of information other than my own have been acknowledged and a reference list has been appended. This work has not been previously submitted to any other university for award of any type of academic degree. Signature……………………………….. Date………………………………………… “A woman in the family is a mother, wife, sister, and daughter.
    [Show full text]
  • CTX Vol 2 No 4
    Vol. 2, No. 4 | CTX EDITORIAL STAFF From the Editor MICHAEL FREEMAN Executive Editor Welcome to our first special issue of CTX, “Social Media in Jihad and ANNA SIMONS Executive Editor Counterterrorism,” which is devoted to a wide-ranging exploration of social ELIZABETH SKINNER Managing Editor media and counterterrorism. Social media have become valuable tools for RYAN STUART Design & Layout combating crime and terrorism. According to LexisNexis® Risk Solutions, four out of five respondents to their survey of law enforcement professionals EDITORIAL REVIEW BOARD reported using social media, particularly Facebook and YouTube, to aid VICTOR ASAL investigations. One officer said he believed his department’s use of social University at Albany SUNY media allowed personnel to defuse a terrorist threat involving students at a ALEJANDRA BOLANOS local high school. Two-thirds said they thought access to social media helps National Defense University solve crimes more quickly. LAWRENCE CLINE Naval Postgraduate School To better understand the role of social media in combating terrorism, the Naval Postgraduate School (NPS) in Monterey, California held a small STEPHEN DI RIENZO workshop on Social Media and Counterterrorism this past June. Sponsored National Intelligence University by the Combating Terrorism Fellowship Program, the workshop brought SAJJAN GOHEL together a diverse group of people, including researchers, law enforcement Asia Pacific Foundation and military officers, and media experts from the United States, Ireland, and SEBASTIAN GORKA the Philippines. Participants were invited to submit papers for inclusion in National Defense University this special issue of CTX. JAKUB GRYGIEL School of Advanced International We are delighted to present here six papers that we received from partici- Studies pants of the workshop.
    [Show full text]
  • Internet Radicalization : Actual Threat Or Phantom Menace?
    Calhoun: The NPS Institutional Archive DSpace Repository Theses and Dissertations 1. Thesis and Dissertation Collection, all items 2012-09 Internet Radicalization : Actual Threat or Phantom Menace? Mealer, Michael J. Monterey, California. Naval Postgraduate School http://hdl.handle.net/10945/17416 Downloaded from NPS Archive: Calhoun NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS INTERNET RADICALIZATION: ACTUAL THREAT OR PHANTOM MENACE? by Michael J. Mealer September 2012 Thesis Co-Advisors: Anders Strindberg Rodrigo Nieto-Gómez Approved for public release; distribution is unlimited THIS PAGE INTENTIONALLY LEFT BLANK REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED September 2012 Master’s Thesis 4. TITLE AND SUBTITLE Internet Radicalization: Actual Threat or Phantom 5. FUNDING NUMBERS Menace? 6. AUTHOR(S) Michael J. Mealer 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION Naval Postgraduate School REPORT NUMBER Monterey, CA 93943-5000 9. SPONSORING /MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10.
    [Show full text]
  • Borderless World, Boundless Threat:Online Jihadists and Modern
    BORDERLESS WORLD, BOUNDLESS THREAT: ONLINE JIHADISTS AND MODERN TERRORISM A Thesis submitted to the Faculty of the Graduate School of Arts and Sciences of Georgetown University in partial fulfillment of the requirements for the degree of Master of Arts in Security Studies By Spencer O. Hayne, B.A. Washington, DC November 19, 2010 Copyright © 2010 by Spencer O. Hayne All Rights Reserved ii BORDERLESS WORLD, BOUNDLESS THREAT: ONLINE JIHADISTS AND MODERN TERRORISM Spencer O. Hayne, B.A. Thesis Advisor: Justine A. Rosenthal, Ph.D. ABSTRACT The online jihadist community represents a new phenomenon in the global spread of Islamic radicalism. Many terrorism experts largely ignore the fact that the Internet is more than just a tool for established terrorist organizations—it can be a platform for the evolution of the jihadist social movement itself. While the majority of this movement’s members are casual supporters of a global Islamist jihad against the West, a number of the community’s members have already proven willing to take their virtual beliefs into the real world through terrorist acts. Many of these terrorists have attracted significant media attention—Jihad Jane, the Christmas Day Bomber, the Fort Hood Shooter, the attack on CIA agents in Afghanistan, the Times Square Bomber, and a number of other “homegrown” terrorists. The individuals perpetrating these terrorist acts are as diverse as they are dangerous, presenting a significant challenge to counterterrorism officials and policymakers. This study profiles 20 recent cases of online jihadists who have made the transition to real-world terrorism along a number of characteristics: age, ethnicity, immigration status, education, religious upbringing, socio-economic class, openness about beliefs, suicidal tendencies, rhetoric focus, location, target, terrorist action, offline and online activity, and social isolation or the presence of an identity crisis.
    [Show full text]
  • Would-Be Warriors: Incidents of Jihadist Terrorist Radicalization in the United States Since September 11, 2001
    CORPORATION THE ARTS This PDF document was made available from www.rand.org as a public CHILD POLICY service of the RAND Corporation. CIVIL JUSTICE EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS NATIONAL SECURITY The RAND Corporation is a nonprofit research POPULATION AND AGING organization providing objective analysis and effective PUBLIC SAFETY solutions that address the challenges facing the public SCIENCE AND TECHNOLOGY and private sectors around the world. SUBSTANCE ABUSE TERRORISM AND HOMELAND SECURITY TRANSPORTATION AND INFRASTRUCTURE WORKFORCE AND WORKPLACE Support RAND Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Learn more about the RAND Corporation View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation occasional paper series. RAND occasional papers may include an informed perspective on a timely policy issue, a discussion of new research methodologies, essays, a paper presented at a conference, a conference summary, or a summary of work in progress. All RAND occasional papers undergo rigorous peer review to ensure that they meet high standards for research quality and objectivity.
    [Show full text]
  • American Self- Radicalizing Terrorists and the Allure of “Jihadi Cool/Chic”
    American Self- Radicalizing Terrorists and the Allure of “Jihadi Cool/Chic” American Self- Radicalizing Terrorists and the Allure of “Jihadi Cool/Chic” By Caroline Joan “Kay” S. Picart American Self-Radicalizing Terrorists and the Allure of “Jihadi Cool/Chic” By Caroline Joan “Kay” S. Picart This book first published 2017 Cambridge Scholars Publishing Lady Stephenson Library, Newcastle upon Tyne, NE6 2PA, UK British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library Copyright © 2017 by Caroline Joan “Kay” S. Picart All rights for this book reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of the copyright owner. ISBN (10): 1-4438-9889-9 ISBN (13): 978-1-4438-9889-8 For my husband, Jerry Rivera, whose love and loyalty are powerfully enduring, and the Picart, Terrell, and Rivera families, whose devotion and support help ease many of life’s storms and contingencies TABLE OF CONTENTS Acknowledgments .................................................................................... viii Chapter I ...................................................................................................... 1 The Rise of American Self-Activating/Radicalizing Terrorists Chapter II ................................................................................................... 41 Colleen LaRose: From Victim of Incest to Aspiring
    [Show full text]
  • CTC Sentinel 2(4)
    APRIL 2009 . VOL 2 . ISSUE 4 COMBATING TERRORISM CENTER AT WEST POINT CTC SEntinEL OBJECTIVE . RELEVANT . RIGOROUS Contents Defining the Punjabi Taliban FEATURE ARTICLE Network 1 Defining the Punjabi Taliban Network By Hassan Abbas By Hassan Abbas REPORTS 4 The 2008 Belgium Cell and FATA’s Terrorist Pipeline By Paul Cruickshank 8 President Obama’s Overseas Terrorism Challenge By Tom Sanderson 11 Improving India’s Counterterrorism Policy after Mumbai By Paul Staniland 14 Leveraging History in AQIM Communications By Lianne Kennedy Boudali 17 AQAP a Rising Threat in Yemen By Brian O’Neill 19 The Role of the United Nations in Defeating Al-Qa`ida and Associated Groups By Richard Barrett 22 Recent Highlights in Terrorist Activity Pakistani commandos respond to the March 30 attack on a police academy near Lahore. - Arif Ali/AFP/Getty Images 24 CTC Sentinel Staff & Contacts n march 30, 2009, militants support for these attacks is attributable launched a deadly assault to what is often labeled the “Punjabi on a police training center Taliban” network.3 The major factions outside Lahore, the capital of this network include operatives from Oof Pakistan’s Punjab Province. Eight Lashkar-i-Jhangvi, Sipah-i-Sahaba police cadets were killed.1 Less than Pakistan and Jaysh-i-Muhammad—all a month earlier, on March 3, gunmen groups that were previously strictly in Lahore ambushed members of the focused on Kashmir and domestic visiting Sri Lankan cricket team, killing sectarian violence. About the CTC Sentinel at least eight people. Punjab, the most The Combating Terrorism Center is an populated of Pakistan’s provinces, has Members of these groups are independent educational and research largely escaped the bloodshed plaguing increasingly supporting Taliban 2 institution based in the Department of Social the country’s troubled northwest.
    [Show full text]
  • Terrorism and the Internet Should Web Sites That Promote 6 Terrorism Be Shut Down? Barbara Mantel
    Terrorism and the Internet Should Web Sites That Promote 6 Terrorism Be Shut Down? Barbara Mantel n March 2008 a participant on the pro al-Qaeda online forum ek-Is.org posted six training sessions for aspiring terrorists. The Ifirst was entitled: “Do you want to form a terror cell?” Using the name Shamil al-Baghdadi, the instructor described how to choose a leader, recruit members and select initial assassination targets. The second lesson outlined assassination techniques.1 “Although the first two training lessons often contain very basic instructions that may be less significant for experienced jihadis, they provide essential training for novices,” said Abdul Hameed Bakier, a Jordanian terrorism expert who translated and summarized the training manual.2 AP Photo/Ellis County Sheriff’s Department AP Photo/Ellis County Sheriff’s The sessions then progressed to more sophisticated topics. Hosam Maher Husein Smadi, a Jordanian teenager in the United States illegally, pleaded not guilty on Oct. 26 Lesson three explained in more detail how to carry out assassina- of trying to blow up a 60-story Dallas skyscraper. tions, including: suicide attacks using booby-trapped vehicles or Smadi reportedly parked a vehicle in the building’s explosive belts; sniper attacks using Russian, Austrian and American garage on Sept. 24 hoping to detonate explosives with rifles and direct attacks through strangling, poison and booby- a cellphone. FBI agents, posing as al-Qaeda trapped cellular phones.3 Lesson four explained how to steal funds, operatives, had been keeping tabs on Smadi after discovering him on an extremist Web site earlier this and the final two lessons gave detailed instructions on how to con- year where he stood out for “his vehement intention to duct “quality terror attacks,” including strikes against U.S.
    [Show full text]
  • Assessing the Terrorist Threat
    REPORT OF THE NATIONAL SECURITY PREPAREDNESS GROUP i PETER BERGEN AND BRUCE HOFFMAN SEPTEMBER 10, 2010 ASSESSING THE TERRORIST THREAT Executive Summary Al-Qaeda and allied groups continue to pose a threat to the United States. Although it is less severe than the catastrophic proportions of a 9/11-like attack, the threat today is more complex and more diverse than at any time over the past nine years. Al-Qaeda or its allies continue to have the capacity to kill dozens, or even hundreds, of Americans in a single attack. A key shift in the past couple of years is the increasingly prominent role in planning and operations that U.S. citizens and residents have played in the leadership of al-Qaeda and aligned groups, and the higher numbers of Americans attaching themselves to these groups. Another development is the increasing diversification of the types of U.S.-based jihadist militants, and the groups with which those militants have affiliated. Indeed, these jihadists do not fit any particular ethnic, economic, educational, or social profile. Al-Qaeda‟s ideological influence on other jihadist groups is on the rise in South Asia and has continued to extend into countries like Yemen and Somalia; al-Qaeda‟s top leaders are still at large, and American overreactions to even unsuccessful terrorist attacks arguably have played, however inadvertently, into the hands of the jihadists. Working against al-Qaeda and allied groups are the ramped-up campaign of drone attacks in Pakistan, increasingly negative Pakistani attitudes and actions against the militants based on their territory, which are mirrored by increasingly hostile attitudes toward al-Qaeda and allied groups in the Muslim world in general, and the fact that erstwhile militant allies have now also turned against al-Qaeda.
    [Show full text]
  • The Strategic Importance of the Internet for Armed Insurgent Groups in Modern Warfare Wael Adhami Wael Adhami Holds a Master’S Degree in Defence and Security Policies
    Volume 89 Number 868 December 2007 The strategic importance of the Internet for armed insurgent groups in modern warfare Wael Adhami Wael Adhami holds a master’s degree in defence and security policies. We are creating a world where anyone, anywhere may express his or her beliefs, no matter how singular, without fear of being coerced into silence of conformity. John Perry Barlow, ‘‘Declaration of the Independence of Cyberspace’’ (1996). Abstract In modern times the Internet has become the only tool which can be used to spread information instantaneously and free of charge to anyone in the world who has an Internet connection. The ability to spread information is vital for any party engaged in an armed conflict. This article will show that groups engaged in a jihad have made the Internet their main outlet to the world. It will further examine the content of Islamic and jihadi websites, their main objectives and the communication strategies used. However, and with a particular focus on Iraq, the author will argue that the Internet does not serve as a platform of recruitment for jihad but is rather the most effective way for armed insurgent groups to win the ‘‘hearts and minds’’ of Muslims worldwide. Introduction In the aftermath of the 11 September 2001 terrorist attacks on the United States (9/11), the threat of being attacked by Islamic groups declaring jihad became the 857 W. Adhami – The strategic importance of the Internet for armed insurgent groups in modern warfare primary security concern of most Western countries. This threat was personified in Al Qaeda, ‘‘led’’ by the Saudi Osama Bin Laden and his ‘‘deputy’’, the Egyptian doctor Ayman Al Zawahiri.1 Through different types of measures (financial restrictions, military operations), the US-led ‘‘global war on terror’’ sought to destroy Al Qaeda and its affiliates.
    [Show full text]
  • The Next Chapter of Global Terrorism New Realities Transcending Old 9/11 Paradigms
    Foreign Policy at BROOKINGS The Next Chapter of Global Terrorism New Realities Transcending Old 9/11 Paradigms Randall A. Blake, National Counterterrorism Center FEDERAL EXECUTIVE FELLOW st 21 CENTURY DEFENSE INITIATIVE POLICY PAPER December 2012 Foreign Policy at BROOKINGS The views expressed in this monograph are those of the author and do not reflect the official policy or position of the National Counterterrorism Center, Office of the Director of National Intelligence, or the U.S. Government. COVER PHOTO COURTESY OF THE U.S. ARMY CONTENTS Page EXECUTIVE SUMMARY .............................................................................................. IV CHAPTER 1: SETTING THE STAGE: THE LASTING IMPACT OF 9/11 ...............1 CHAPTER 2: CLOSING THE BIN LADEN CHAPTER OF GLOBAL JIHAD .........5 CHAPTER 3: FAR ENEMY STRATEGY UNDER REVIEW: THINK GLOBALLY, ACT LOCALLY ...........................................................................................................9 CHAPTER 4: MOST DANGEROUS NEIGHBORHOOD ON THE PLANET, STILL ...........................................................................................................................12 CHAPTER 5: THIRTY YEARS WAR: UPHEAVALS IN SLOW MOTION ............16 CHAPTER 6: DIY TERROR: FIGHTING OVERSEAS WARS AT HOME ..............19 CHAPTER 7: FUELING THE WI-FIRE ........................................................................22 CHAPTER 8: INCREASED DEMOCRATIZATION OF SCIENCE AND TECHNOLOGY .........................................................................................................26
    [Show full text]