Download/File/ICCT-Schmid-Radicalisation-De-Radicalisation-Count Er-Radicalisation-March-2013.Pdf
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Alexander Meleagrou-Hitchens, Seamus Hughes, Bennett Clifford FEBRUARY 2018
Alexander Meleagrou-Hitchens, Seamus Hughes, Bennett Clifford FEBRUARY 2018 THE TRAVELERS American Jihadists in Syria and Iraq BY Alexander Meleagrou-Hitchens, Seamus Hughes, Bennett Cliford Program on Extremism February 2018 All rights reserved. Printed in the United States of America. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. © 2018 by Program on Extremism Program on Extremism 2000 Pennsylvania Avenue NW Washington, DC 20006 www.extremism.gwu.edu Contents Acknowledgements .......................................................................................................v A Note from the Director .........................................................................................vii Foreword ......................................................................................................................... ix Executive Summary .......................................................................................................1 Introduction: American Jihadist Travelers ..........................................................5 Foreign Fighters and Travelers to Transnational Conflicts: Incentives, Motivations, and Destinations ............................................................. 5 American Jihadist Travelers: 1980-2011 ..................................................................... 6 How Do American Jihadist -
Article Drone Vision
Article Drone Vision Daniel Greene University of Maryland, US. [email protected] Abstract What does the drone want? What does the drone need? Such questions, posed explicitly and implicitly by anthropomorphized drones in contemporary popular culture, may seem like distractions from more pressing political and empirical projects addressing the Global War on Terror (GWOT). But the artifacts posing these questions offer a different way of viewing contemporary surveillance and violence that helps decouple the work of drones from justifications for drone warfare, and reveals the broader technological and political network of which drones are the most immediate manifestation. This article explores ‘drone vision’ a globally distributed apparatus for finding, researching, fixing and killing targets of the GWOT, and situates dramatizations of it within recent new materialist theoretical debates in surveillance and security studies. I model the tactic of ‘seeing like a drone’ in order to map the networks that support it. This tactic reveals a disconnect between the materials and discourses of drone vision, a disconnect I historicize within a new, imperial visual culture of war distinct from its modernist, disciplinary predecessor. I then explore two specific attempts to see like a drone: the drone art of London designer James Bridle and the Tumblr satire Texts from Drone. I conclude by returning to drone anthropomorphism as a technique for mapping the apparatus of drone vision, arguing that drone meme arises precisely in response to these new subjects -
Filling Terrorism Gaps: Veos, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan
PNNL-25727 Filling Terrorism Gaps: VEOs, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan August 2016 PNNL-25727 Filling Terrorism Gaps: VEOs, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan August 2016 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Pacific Northwest National Laboratory Richland, Washington 99352 PNNL-25727 Abstract This paper aims to address three issues: the lack of literature differentiating terrorism and violent extremist organizations (VEOs), terrorism incident databases, and the applicability of Risk Terrain Modeling (RTM) to terrorism. Current open source literature and publicly available government sources do not differentiate between terrorism and VEOs; furthermore, they fail to define them. Addressing the lack of a comprehensive comparison of existing terrorism data sources, a matrix comparing a dozen terrorism databases is constructed, providing insight toward the array of data available. RTM, a method for spatial risk analysis at a micro level, has some applicability to terrorism research, particularly for studies looking at risk indicators of terrorism. Leveraging attack data from multiple databases, combined with RTM, offers one avenue for closing existing research gaps in terrorism literature. iii Acknowledgments The author would like to sincerely thank several individuals for their contributions to this research. My mentor, Chrissie Noonan, for her guidance and support throughout this process, Carolyn Cramer for her operational support and insight, Alex Stephan, Lead for the Special Programs and Scientific Studies Team at PNNL, George Muller for his support and direction, Hannah Trump for her substantial help with the appendices, and Dan Fortin, Sam Chatterjee, and Thomas Johansen for the constant discussions. -
Notes on a Terrorism Trial •Fi Preventive Prosecution, Â
Notes on a Terrorism Trial – Preventive Prosecution, “Material Support” and The Role of The Judge after United States v. Mehanna George D. Brown* Abstract The terrorism trial of Tarek Mehanna, primarily for charges of providing “material support” to terrorism, presented elements of a preventive prosecution as well as the problem of applying Holder v. Humanitarian Law Project (HLP) to terrorism‐related speech. This Article examines both aspects of the case, with emphasis on the central role of the trial judge. As criminal activity becomes more amorphous, the jury looks to the judge for guidance. His rulings on potentially prejudicial evidence which may show just how much of a “terrorist” the defendant is are the key aspect of this guidance. If the defendant is found guilty, the sentence imposed by the judge can have a profound impact on future preventive prosecutions. Particularly important is the judge’s handling of the Sentencing Guidelines’ “Terrorism Enhancement.” As for speech issues, there is enough ambiguity in HLP to let lower courts formulate and apply its test differently. HLP emphasizes co‐ordination with a foreign terrorist organization before speech can be criminalized. There is now movement toward a concept of one‐way coordination that can turn speech prosecutions into a form of general prevention of potential terrorists. All of these issues were central to Mehanna. The Article’s analysis of how the trial court handled them is meant to increase understanding of them, and to highlight the central role of the judge. I. Introduction -
The Disposition Matrix
افغاوستان آزاد – آزاد افغاوستان AA-AA چو کشور وباشـد ته مه مبـــــــاد بدیه بوم وبر زوده یک ته مــــباد همه سر به سر ته به کشته دهیم از آن به که کشور به دشمه دهیم www.afgazad.com [email protected] زبان های اروپائی European Languages http://www.guardian.co.uk/world/2013/jul/14/obama-secret-kill-list-disposition-matrix/print Obama's secret kill list – the disposition matrix The disposition matrix is a complex grid of suspected terrorists to be traced then targeted in drone strikes or captured and interrogated. And the British government appears to be colluding in it Ian Cobain 7/14/2013 When Bilal Berjawi spoke to his wife for the last time, he had no way of being certain that he was about to die. But he should have had his suspicions. A short, dumpy Londoner who was not, in the words of some who knew him, one of the world's greatest thinkers, Berjawi had been fighting for months in Somalia with al-Shabaab, the Islamist militant group. His wife was 4,400 miles away, at home in west London. In June 2011, Berjawi had almost been killed in a US drone strike on an al-Shabaab camp on the coast. After that he became wary of telephones. But in January last year, when his wife went into labour and was admitted to St Mary's hospital in Paddington, he decided to risk a quick phone conversation. A few hours after the call ended Berjawi was targeted in a fresh drone strike. Perhaps the telephone contact triggered alerts all the way from Camp Lemmonier, the US military's enormous home-from-home at Djibouti, to the National Security Agency's headquarters in Maryland. -
Identifying Enemies Among Us: Evolving Terrorist Threats and the Continuing Challenges of Domestic Intelligence Collection and Information Sharing
CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that helps improve policy and EDUCATION AND THE ARTS decisionmaking through research and analysis. ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE This electronic document was made available from www.rand.org as a public service INFRASTRUCTURE AND of the RAND Corporation. TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS Skip all front matter: Jump to Page 16 NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY Support RAND SCIENCE AND TECHNOLOGY Purchase this document TERRORISM AND Browse Reports & Bookstore HOMELAND SECURITY Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND Corporation View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non- commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation conference proceedings series. RAND conference proceedings present a collection of papers delivered at a conference or a summary of the conference. The material herein has been vetted by the conference attendees and both the introduction and the post-conference material have been re- viewed and approved for publication by the sponsoring research unit at RAND. -
Federal Bureau of Investigation Department of Homeland Security
Federal Bureau of Investigation Department of Homeland Security Strategic Intelligence Assessment and Data on Domestic Terrorism Submitted to the Permanent Select Committee on Intelligence, the Committee on Homeland Security, and the Committee of the Judiciary of the United States House of Representatives, and the Select Committee on Intelligence, the Committee on Homeland Security and Governmental Affairs, and the Committee of the Judiciary of the United States Senate May 2021 Page 1 of 40 Table of Contents I. Overview of Reporting Requirement ............................................................................................. 2 II. Executive Summary ......................................................................................................................... 2 III. Introduction...................................................................................................................................... 2 IV. Strategic Intelligence Assessment ................................................................................................... 5 V. Discussion and Comparison of Investigative Activities ................................................................ 9 VI. FBI Data on Domestic Terrorism ................................................................................................. 19 VII. Recommendations .......................................................................................................................... 27 Appendix .................................................................................................................................................... -
How Anwar Al-Awlaki Became the Face of Western Jihad
As American as Apple Pie: How Anwar al-Awlaki Became the Face of Western Jihad Alexander Meleagrou-Hitchens Foreword by Lord Carlile of Berriew QC A policy report published by the International Centre for the Study of Radicalisation and Political Violence (ICSR) ABOUT ICSR The International Centre for the Study of Radicalisation and Political Violence (ICSR) is a unique partnership in which King’s College London, the University of Pennsylvania, the Interdisciplinary Center Herzliya (Israel), the Regional Center for Conflict Prevention Amman (Jordan) and Georgetown University are equal stakeholders. The aim and mission of ICSR is to bring together knowledge and leadership to counter the growth of radicalisation and political violence. For more information, please visit www.icsr.info. CONTACT DETAILS For questions, queries and additional copies of this report, please contact: ICSR King’s College London 138 –142 Strand London WC2R 1HH United Kingdom T. +44 (0)20 7848 2065 F. +44 (0)20 7848 2748 E. [email protected] Like all other ICSR publications, this report can be downloaded free of charge from the ICSR website at www.icsr.info. © ICSR 2011 AUTHOR’S NOTE This report contains many quotes from audio lectures as well as online forums and emails. All of these have been reproduced in their original syntax, including all spelling and grammatical errors. Contents Foreword 2 Letter of Support from START 3 Glossary of Terms 4 Executive Summary 6 Chapter 1 Introduction 9 Chapter 2 Methodology and Key Concepts 13 Social Movement Theory 13 Framing and -
Anwar Al-Aulaqi: Targeted Killings, Emergency Executive Powers, and the Rp Inciple of Proportionality Charles John Smith
Seton Hall University eRepository @ Seton Hall Law School Student Scholarship Seton Hall Law 5-1-2014 Anwar al-Aulaqi: Targeted Killings, Emergency Executive Powers, And The rP inciple Of Proportionality Charles John Smith Follow this and additional works at: https://scholarship.shu.edu/student_scholarship Recommended Citation Smith, Charles John, "Anwar al-Aulaqi: Targeted Killings, Emergency Executive Powers, And The rP inciple Of Proportionality" (2014). Law School Student Scholarship. 580. https://scholarship.shu.edu/student_scholarship/580 ANwAR AL-AULAQI: TARGETED KILLINGS, EMERGENCY EXECUTIVE POWERS, AND THE PRINCIPLE OF PROPORTIONALITY INTRODUCTION Between 2002 and 2009, the United States is believed to have conducted over 50 predator drone strikes between Pakistan, Yemen, and Somalia. 1 Since January 2009, that number has increased to a total of over 300 strikes.2 The drone strikes reached their peak in 2010, with 121 confirmed strikes, 117 of which took place in Pakistan. 3 The escalation in the number of drone strikes throughout the Middle East has been part of a concerted effort, beginning with the Bush Administration and intensified under the Obama Administration, to target members of al-Qaeda, al-Qa'ida in the Arabian Peninsula (AQAP), and other terrorist groups included in the broader war against terrorism. However, with the increase in attacks emanating from Yemen, the Obama administration has begun shifting its focus to the Arabian Peninsula. As a result, the strikes in Yemen have so far outnumbered those in Pakistan for the first time in 2012.4 Although President Obama inherited the drone program, because of the increasing frequency of strikes, his administration has become synonymous with the practice. -
Mehanna Government Brief
Case: 12-1461 Document: 00116514022 Page: 1 Date Filed: 04/08/2013 Entry ID: 5724362 NO. 12-1461 IN THE UNITED STATES COURT OF APPEALS FOR THE FIRST CIRCUIT __________ UNITED STATES OF AMERICA, APPELLEE V. TAREK MEHANNA, APPELLANT __________ ON APPEAL FROM THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MASSACHUSETTS __________ BRIEF FOR THE UNITED STATES __________ CARMEN M. ORTIZ MYTHILI RAMAN United States Attorney Acting Assistant Attorney General District of Massachusetts Criminal Division JOHN P. CARLIN DENIS J. MCINERNEY Acting Assistant Attorney Acting Deputy Assistant Attorney General General Criminal Division National Security Division ELIZABETH D. COLLERY JOSEPH F. PALMER Attorney, Appellate Section JEFFREY D. GROHARING Criminal Division Attorneys U.S. Department of Justice National Security Division 950 Pennsylvania Ave., N.W., Room 1264 Washington, DC 20530 (202) 353-3891 [email protected] Case: 12-1461 Document: 00116514022 Page: 2 Date Filed: 04/08/2013 Entry ID: 5724362 TABLE OF CONTENTS JURISDICTIONAL STATEMENT. ........................................................................ 1 STATEMENT OF THE ISSUES. ............................................................................ 1 STATEMENT OF THE CASE................................................................................. 3 STATEMENT OF FACTS. ...................................................................................... 6 1. Overview. ............................................................................................. 6 2. Mehanna -
Opening Brief
Case: 12-1461 Document: 00116470099 Page: 1 Date Filed: 12/17/2012 Entry ID: 5698298 UNITED STATES COURT OF APPEALS FOR THE FIRST CIRCUIT No. 12-1461 Tarek Mehanna, Defendant-Appellant, v. United States of America, Appellee. ON APPEAL FROM A JUDGMENT OF THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MASSACHUSETTS BRIEF OF DEFENDANT-APPELLANT TAREK MEHANNA Sabin Willett, No. 18725 J. W. Carney, Jr., No. 40016 Susan Baker Manning, No. 1152545 CARNEY & BASSIL Julie Silva Palmer, No. 1140407 20 Park Plaza, Suite 1405 BINGHAM McCUTCHEN LLP Boston, MA 02116 One Federal Street 617.338.5566 Boston, Massachusetts 02110-1726 617.951.8000 Case: 12-1461 Document: 00116470099 Page: 2 Date Filed: 12/17/2012 Entry ID: 5698298 TABLE OF CONTENTS REASONS WHY ORAL ARGUMENT SHOULD BE HEARD ........................... xi JURISDICTIONAL STATEMENT ......................................................................... 1 STATEMENT OF ISSUES ...................................................................................... 1 STATEMENT OF THE CASE ................................................................................. 3 STATEMENT OF FACTS ....................................................................................... 7 SUMMARY OF ARGUMENT .............................................................................. 19 ARGUMENT .......................................................................................................... 21 I. STANDARD OF REVIEW ......................................................................... -
Plan for Hunting Terrorists Signals U.S. Intends to Keep Adding Names to Kill Lists - the Wa
Plan for hunting terrorists signals U.S. intends to keep adding names to kill lists - The Wa... Page 1 of 7 Back to previous page Plan for hunting terrorists signals U.S. intends to keep adding names to kill lists By Greg Miller, Published: October 23 Over the past two years, the Obama administration has been secretly developing a new blueprint for pursuing terrorists, a next-generation targeting list called the “disposition matrix.” The matrix contains the names of terrorism suspects arrayed against an accounting of the resources being marshaled to track them down, including sealed indictments and clandestine operations. U.S. officials said the database is designed to go beyond existing kill lists, mapping plans for the “disposition” of suspects beyond the reach of American drones. Although the matrix is a work in progress, the effort to create it reflects a reality setting in among the nation’s counterterrorism ranks: The United States’ conventional wars are winding down, but the government expects to continue adding names to kill or capture lists for years. Among senior Obama administration officials, there is a broad consensus that such operations are likely to be extended at least another decade. Given the way al-Qaeda continues to metastasize, some officials said no clear end is in sight. “We can’t possibly kill everyone who wants to harm us,” a senior administration official said. “It’s a necessary part of what we do. We’re not going to wind up in 10 years in a world of everybody holding hands and saying, ‘We love America.’ ” That timeline suggests that the United States has reached only the midpoint of what was once known as the global war on terrorism.