ISIS Propaganda and United States Countermeasures

Total Page:16

File Type:pdf, Size:1020Kb

ISIS Propaganda and United States Countermeasures BearWorks MSU Graduate Theses Fall 2015 ISIS Propaganda and United States Countermeasures Daniel Lincoln Stevens As with any intellectual project, the content and views expressed in this thesis may be considered objectionable by some readers. However, this student-scholar’s work has been judged to have academic value by the student’s thesis committee members trained in the discipline. The content and views expressed in this thesis are those of the student-scholar and are not endorsed by Missouri State University, its Graduate College, or its employees. Follow this and additional works at: https://bearworks.missouristate.edu/theses Part of the Defense and Security Studies Commons Recommended Citation Stevens, Daniel Lincoln, "ISIS Propaganda and United States Countermeasures" (2015). MSU Graduate Theses. 1503. https://bearworks.missouristate.edu/theses/1503 This article or document was made available through BearWorks, the institutional repository of Missouri State University. The work contained in it may be protected by copyright and require permission of the copyright holder for reuse or redistribution. For more information, please contact [email protected]. ISIS PROPAGANDA AND UNITED STATES COUNTERMEASURES A Masters Thesis Presented to The Graduate College of Missouri State University In Partial Fulfillment Of the Requirements for the Degree Master of Science, Defense and Strategic Studies By Daniel Stevens December 2015 Copyright 2015 by Daniel Lincoln Stevens ii ISIS PROPAGANDA AND UNITED STATES COUNTERMEASURES Defense and Strategic studies Missouri State University, December 2015 Master of Science Daniel Stevens ABSTRACT The purpose of this study is threefold: 1. Examine the use of propaganda by the Islamic State in Iraq and al Sham (ISIS) and how its propaganda enables ISIS to achieve its objectives; 2. Examine the United States Government (USG) response; 3. Evaluate the effectiveness of the USG response and how it can be improved. The goal of ISIS is to overturn the Middle East, attack westerners in the region and in the West, and create one all-encompassing Islamic State. ISIS’ innovative use of propaganda has been central to its success. ISIS uses propaganda more effectively than previous terrorist groups. What is unique about ISIS propaganda is its success at luring disaffected Westerners to its side. The messages of ISIS propaganda are interpreted by studying the teachings of key jihadist theologians and by examining the content of ISIS propaganda. The approach in this thesis is to listen to what ISIS has to say about itself and its objectives. The struggles and short comings of the USG response are attested to by former directors of USG counter terror messaging. This paper reveals the USG’s response to ISIS propaganda falls short in effectively addressing the full range of ISIS propaganda’s diversity in messages, audiences, and platforms. For the government to effectively undermine the effectiveness of ISIS propaganda, it must accept the need for more creativity and diversity in its messaging, and find a role it can play in conjunction with a supportive private sector capable of engaging in diverse messages to diverse audiences across diverse platforms. KEYWORDS: ISIS, terrorism, propaganda, western, counter measures This abstract is approved as to form and content _______________________________ David Peck Chairperson, Advisory Committee Missouri State University iii ISIS PROPAGANDA AND UNITED STATES COUNTERMEASURES By Daniel Stevens A Masters Thesis Submitted to the Graduate College Of Missouri State University In Partial Fulfillment of the Requirements For the Degree of Master of Science, Defense and Strategic Studies December 2015 Approved: _______________________________________ Mr. David Peck _______________________________________ Dr. John P. Rose _______________________________________ Mr. Ilan Berman _______________________________________ Dr. Julie Masterson: Dean, Graduate College iv TABLE OF CONTENTS I. Executive Summary ..............................................................................................1 II. Definition of Terms .............................................................................................6 III. ISIS History, Ideology, and Strategy. ................................................................9 ISIS is a threat to the Middle East and the West ................................................9 ISIS’ ideology informs ISIS’ objectives, strategy, and propaganda messaging .........................................................................................................16 ISIS’ battle field success comes from its assimilation of Baathist commanders and intelligence experts ..............................................................21 Brutality is central to ISIS’ strategy of polarization and recruitment. .............25 ISIS’ innovative propaganda strategy both supports and is driven by its ideology, battlefield success, and use of violence. ..........................................30 IV. ISIS Uses Propaganda For Diverse Messages To Diverse Audiences Across Diverse Platforms............................................................................................ 32 ISIS uses apps and various online platforms for mass communication ...........33 ISIS causes fear by using propaganda as a tool for psychological warfare. ....36 ISIS uses video to effectively communicate to target audiences. ....................39 Dabiq is the official ISIS magazine .................................................................49 ISIS uses the Internet and mobile apps to reach out and recruit new members ...........................................................................................................52 The classical literary journey of a ‘hero’ is the most basic theme of terrorist recruitment. ......................................................................................................53 New recruits help recruit others through word of mouth .................................54 ISIS uses social media to engage in personal messaging. ...............................54 ISIS actively recruits women ...........................................................................56 Profiles of western women who joined ISIS ...................................................59 Converts and ISIS recruits come from non-Muslim backgrounds as well. .....66 ISIS propaganda is vulnerable to some of its own claims ...............................72 V. The United States Government’s Response To ISIS Propaganda Falls Short In Effectively Addressing The Full Range Of ISIS Propaganda’s Diversity In Messages, Audiences, And Platforms. ........................................................76 State Department’s Center for Strategic Counterterrorism Communications .76 Non-Government Organizations Countering ISIS Propaganda .......................85 The CSCC responds to some but not all ISIS messages. .................................90 Women and new converts to Islam are not specifically targeted by USG counter-propaganda..........................................................................................96 Problems with USG Approaches ....................................................................98 Evaluation of Criticism ..................................................................................105 VI. Recommendations For The USG And Private Sector. ..................................108 v VII. Conclusion ....................................................................................................113 Works Cited .........................................................................................................115 vi LIST OF FIGURES Figure1. Map for projected Islamic State. ...............................................................9 Figure 2. Major ISIS attacks and arrests since Sept. 2014-Aug. 2015. .................13 Figure 3. Where Islamic State’s supporters are tweeting from. .............................34 vii EXECUTIVE SUMMARY The Islamic State (ISIS) threatens to overturn the entire Middle East and to attack westerners in the region and at home. The objective of ISIS is the creation of a unitary Islamic state or “Caliphate” encompassing all regions that have at any point in history been under Islamic control and, potentially, territories with significant Muslim populations. This includes the greater Middle East, North Africa, Central Asia, South and Central Asia, and parts of Europe. This ISIS state directly challenges the US policy of creating and supporting a stable and representative government in Iraq, as well as US interests in promoting free, prosperous and liberal societies across the region. ISIS has also called for and inspired attacks against the West making ISIS a threat to the US and the rest of the Western world. The U.S. government now considers ISIS a greater threat than al Qaeda (AQ). ISIS represents an old threat in a new way. It has developed because the instability and lack of authority in Syria and Iraq has created a geopolitical vacuum ripe for exploitation by terrorist groups with territorial ambitions. ISIS evolved from an al Qaeda affiliated terrorist group involved in the Iraq insurgency into an aspiring state actor. ISIS is creating a brutal police state after the mold of Saddam Hussein’s regime. The creation of the ISIS state is guided in part by Baathists who previously worked for Saddam Hussein’s regime. The Baath Party is a trans-border socialist Arab nationalist party. One of its
Recommended publications
  • ISIS in Africa: Implications from Syria and Iraq Dr
    ISIS in Africa: Implications from Syria and Iraq Dr. Joseph Siegle28 Africa Center for Strategic Studies National Defense University At the end of 2016, Abu Bakr al-Baghdadi, leader of the Islamic State of Iraq and Syria (ISIS), announced that the group had “expanded and shifted some of our command, media, and wealth to Africa.” ISIS’s Dabiq magazine referred to the regions of Africa that were part of its “caliphate:” “the region that includes Sudan, Chad and Egypt has been named the caliphate province of Alkinaana; the region that includes Eritrea, Ethiopia, Somalia, Kenya and Uganda as the province of Habasha; the North African region encompassing Libya, Tunisia, Morocco, Algeria, Nigeria, Niger and Mauritania as Maghreb, the province of the caliphate.” Leaving aside the mismatched ethno-linguistic groupings included in each of these “provinces,” ISIS’s interest in establishing a presence in Africa has long been a part of its vision for a global caliphate. Battlefield setbacks in ISIS’s strongholds in Iraq and Syria since 2015, however, raise questions of what impact this will have for ISIS’s African aspirations. A useful starting point in considering this question is to recognize that the threat from violent Islamist groups in Africa is not monolithic but is comprised of a variety of distinct entities. For the most part, these groups are geographically concentrated and focused on local territorial or political objectives. Specifically, the Africa Center for Strategic Studies has identified 5 major categories of militant Islamists groups in Africa (see map): http://africacenter.org/wp-content/uploads/2016/11/Africas-Active-Militant-Islamist- Groups-November-2016.pdf.
    [Show full text]
  • Policy Notes for the Trump Notes Administration the Washington Institute for Near East Policy ■ 2018 ■ Pn55
    TRANSITION 2017 POLICYPOLICY NOTES FOR THE TRUMP NOTES ADMINISTRATION THE WASHINGTON INSTITUTE FOR NEAR EAST POLICY ■ 2018 ■ PN55 TUNISIAN FOREIGN FIGHTERS IN IRAQ AND SYRIA AARON Y. ZELIN Tunisia should really open its embassy in Raqqa, not Damascus. That’s where its people are. —ABU KHALED, AN ISLAMIC STATE SPY1 THE PAST FEW YEARS have seen rising interest in foreign fighting as a general phenomenon and in fighters joining jihadist groups in particular. Tunisians figure disproportionately among the foreign jihadist cohort, yet their ubiquity is somewhat confounding. Why Tunisians? This study aims to bring clarity to this question by examining Tunisia’s foreign fighter networks mobilized to Syria and Iraq since 2011, when insurgencies shook those two countries amid the broader Arab Spring uprisings. ©2018 THE WASHINGTON INSTITUTE FOR NEAR EAST POLICY. ALL RIGHTS RESERVED. THE WASHINGTON INSTITUTE FOR NEAR EAST POLICY ■ NO. 30 ■ JANUARY 2017 AARON Y. ZELIN Along with seeking to determine what motivated Evolution of Tunisian Participation these individuals, it endeavors to reconcile estimated in the Iraq Jihad numbers of Tunisians who actually traveled, who were killed in theater, and who returned home. The find- Although the involvement of Tunisians in foreign jihad ings are based on a wide range of sources in multiple campaigns predates the 2003 Iraq war, that conflict languages as well as data sets created by the author inspired a new generation of recruits whose effects since 2011. Another way of framing the discussion will lasted into the aftermath of the Tunisian revolution. center on Tunisians who participated in the jihad fol- These individuals fought in groups such as Abu Musab lowing the 2003 U.S.
    [Show full text]
  • Jihadism: Online Discourses and Representations
    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-ND 4.0 1 Studying Jihadism 2 3 4 5 6 Volume 2 7 8 9 10 11 Edited by Rüdiger Lohlker 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 The volumes of this series are peer-reviewed. 37 38 Editorial Board: Farhad Khosrokhavar (Paris), Hans Kippenberg 39 (Erfurt), Alex P. Schmid (Vienna), Roberto Tottoli (Naples) 40 41 Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-ND 4.0 1 Rüdiger Lohlker (ed.) 2 3 4 5 6 7 Jihadism: Online Discourses and 8 9 Representations 10 11 12 13 14 15 16 17 With many figures 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 & 37 V R unipress 38 39 Vienna University Press 40 41 Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-ND 4.0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 Bibliographic information published by the Deutsche Nationalbibliothek The Deutsche Nationalbibliothek lists this publication in the Deutsche Nationalbibliografie; 24 detailed bibliographic data are available online: http://dnb.d-nb.de.
    [Show full text]
  • Australia: Extremism and Terrorism
    Australia: Extremism and Terrorism On March 17, 2021, authorities arrested brothers Aran and Ari Sherani, ages 19 and 20 respectively, during counterterrorism raids in Melbourne after Aran allegedly purchased a knife in preparation for a terrorist attack. Police alleged Aran was influenced by ISIS. Both brothers were charged in relation to a February 21 attempted attack in Humevale, in which a fire was lit in bushland outside of Melbourne. Aran Shirani also faces charges in relation to a March 9 assault that left one injured. Authorities allege Aran Shirani radicalized online and then radicalized his older brother. (Sources: Guardian, 9News, Australian Press Association) On December 17, 2020, 22-year-old Raghe Abdi threated Australian police officers with a knife on a highway outside of Brisbane and was then shot dead by the authorities. According to police, Abdi was influenced by ISIS. That same day, 87-year-old Maurice Anthill and his 86-year-old wife Zoe were found dead inside their home in Brisbane, where Abdi was believed to have been. Police Commissioner Katarina Carroll Abdi said that though Abdi was a known extremist, the suspect had acted alone, and declared the deaths a terrorism incident. Abdi was arrested on suspicion of joining extremist groups while he attempted to board a flight to Somalia in May 2019. He was released due to lack of evidence, though his passport was canceled. Abdi was again charged in June 2019 on other offenses, including not providing his cellphone passcode to investigators but was freed on bail and given a GPS tracking device to wear.
    [Show full text]
  • The Criminal-Jihadist: Insights Into Modern Terrorist Financing
    AUGUST 2016 No. 10 STRATEGIC SECURITY ANALYSIS The Criminal-Jihadist: Insights into Modern Terrorist Financing by Dr Christina Schori Liang STRATEGIC SECURITY ANALYSIS GCSP - THE CRIMINAL JIHADIST: INSIGHTS INTO MODERN TERRORIST FINANCING Introduction KEY POINTS Terrorism is proving to be This paper provides a snapshot an enduring global security of how modern terrorist groups • Criminal-terrorist networks are threat. Since the late 1990s finance their organisations and weakening states by eroding state terrorist groups have become operations. It will identify the structures, undermining the rule more lethal, networked, and key issues that are driving the of law, and creating illegitimate technologically savvy. The growing nexus of terrorism governments. They rule over large world is currently dealing with and organised crime. The swathes of territory, where they are two global terrorist groups – paper will also explore the able to govern with impunity. al-Qaeda and IS – that have various working relationships recruited affiliates across the between terrorist and criminal • Criminal-terrorist networks and globe. In 2014 the lives lost groups, outlining under what relationships have enabled due to terrorism around the conditions and to what extent al-Qaeda and the Islamic State world increased by 80 per cent they cooperate. This will help to (IS) to broaden the scope of their compared to the previous year.1 identify existing and potentially power by increasing the numbers of new countermeasures to dry their affiliates and partners across Several terrorist groups currently up terrorist funding, and to parts of West, East, and North have the ability to control land dismantle and destroy terrorist- Africa and Southeast Asia.
    [Show full text]
  • The Coming Turkish- Iranian Competition in Iraq
    UNITeD StateS INSTITUTe of Peace www.usip.org SPeCIAL RePoRT 2301 Constitution Ave., NW • Washington, DC 20037 • 202.457.1700 • fax 202.429.6063 ABOUT THE REPO R T Sean Kane This report reviews the growing competition between Turkey and Iran for influence in Iraq as the U.S. troop withdrawal proceeds. In doing so, it finds an alignment of interests between Baghdad, Ankara, and Washington, D.C., in a strong and stable Iraq fueled by increased hydrocarbon production. Where possible, the United States should therefore encourage The Coming Turkish- Turkish and Iraqi cooperation and economic integration as a key part of its post-2011 strategy for Iraq and the region. This analysis is based on the author’s experiences in Iraq and Iranian Competition reviews of Turkish and Iranian press and foreign policy writing. ABOUT THE AUTHO R in Iraq Sean Kane is the senior program officer for Iraq at the United States Institute of Peace (USIP). He assists in managing the Institute’s Iraq program and field mission in Iraq and serves as the Institute’s primary expert on Iraq and U.S. policy in Iraq. Summary He previously worked for the United Nations Assistance Mission • The two rising powers in the Middle East—Turkey and Iran—are neighbors to Iraq, its for Iraq from 2006 to 2009. He has published on the subjects leading trading partners, and rapidly becoming the most influential external actors inside of Iraqi politics and natural resource negotiations. The author the country as the U.S. troop withdrawal proceeds. would like to thank all of those who commented on and provided feedback on the manuscript and is especially grateful • Although there is concern in Washington about bilateral cooperation between Turkey and to Elliot Hen-Tov for generously sharing his expertise on the Iran, their differing visions for the broader Middle East region are particularly evident in topics addressed in the report.
    [Show full text]
  • TITLE Ll—AUTHORITY for the USE of MILITARY FORCE AGAINST
    DAV15E09 S.L.C. AMENDMENT NO.llll Calendar No.lll Purpose: To authorize the use of the United States Armed Forces against the Islamic State of Iraq and the Levant. IN THE SENATE OF THE UNITED STATES—114th Cong., 1st Sess. (no.) lllllll (title) llllllllllllllllllllllllllllll lllllllllllllllllllllllllllllllll lllllllllllllllllllllllllllllllll Referred to the Committee on llllllllll and ordered to be printed Ordered to lie on the table and to be printed AMENDMENT intended to be proposed by Mr. KAINE (for himself and Mr. FLAKE) Viz: 1 At the appropriate place, insert the following: 2 TITLE ll—AUTHORITY FOR 3 THE USE OF MILITARY FORCE 4 AGAINST THE ISLAMIC STATE 5 OF IRAQ AND THE LEVANT 6 SEC. l1. SHORT TITLE. 7 This title may be cited as the ‘‘Authority for the Use 8 of Military Force Against the Islamic State of Iraq and 9 the Levant Act’’. 10 SEC. l2. FINDINGS. 11 Congress makes the following findings: DAV15E09 S.L.C. 2 1 (1) The terrorist organization that has referred 2 to itself as the Islamic State of Iraq and the Levant 3 and various other names (in this resolution referred 4 to as ‘‘ISIL’’) poses a grave threat to the people and 5 territorial integrity of Iraq and Syria, regional sta- 6 bility, and the national security interests of the 7 United States and its allies and partners. 8 (2) ISIL holds significant territory in Iraq and 9 Syria and has stated its intention to seize more ter- 10 ritory and demonstrated the capability to do so. 11 (3) ISIL leaders have stated that they intend to 12 conduct terrorist attacks internationally, including 13 against the United States, its citizens, and interests.
    [Show full text]
  • The Islamic State's Use of Online Social Media
    Military Cyber Affairs Volume 1 Issue 1 Article 4 2015 The Islamic State’s Use of Online Social Media Lisa Blaker University of Maryland, Baltimore County, [email protected] Follow this and additional works at: https://scholarcommons.usf.edu/mca Part of the Communication Technology and New Media Commons, and the Social Influence and Political Communication Commons Recommended Citation Blaker, Lisa (2015) "The Islamic State’s Use of Online Social Media," Military Cyber Affairs: Vol. 1 : Iss. 1 , Article 4. https://www.doi.org/http://dx.doi.org/10.5038/2378-0789.1.1.1004 Available at: https://scholarcommons.usf.edu/mca/vol1/iss1/4 This Article is brought to you for free and open access by Scholar Commons. It has been accepted for inclusion in Military Cyber Affairs by an authorized editor of Scholar Commons. For more information, please contact [email protected]. Blaker: The Islamic State’s Use of Online Social Media The Islamic State’s Use of Online Social Media LISA BLAKER, University of Maryland, Baltimore County 1. INTRODUCTION The Islamic State of Iraq and Syria (ISIS) has made great use of the Internet and online social media sites to spread its message and encourage others, particularly young people, to support the organization, to travel to the Middle East to engage in combat—fighting side-by-side with other jihadists, or to join the group by playing a supporting role—which is often the role carved out for young women who are persuaded to join ISIS. The terrorist group has even directed sympathizers to commit acts of violence wherever they are when traveling to the Middle East isn’t possible.
    [Show full text]
  • CDS/ISIS Handbook by the Same Authors Which Was Published by the UK Library Association in 1994
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Middlesex University Research Repository The CDS/ISIS for WindowsHandbook Andrew Buxton Alan Hopkinson THE CDS/ISIS FOR WINDOWS Handbook Andrew Buxton Information Systems Manager Institute of Development Studies at the University of Sussex and Alan Hopkinson Head of Library Systems Middlesex University Paris, UNESCO/CI, September 2001 CONTENTS Foreword Preface Aims of this handbook Conventions used in this book 1 Introduction 1 1.1 Versions of CDS/ISIS for DOS and Windows 1.1.1 CDS/ISIS for DOS 1.1.2 CDS/ISIS for Windows 1.1.3 WWWISIS 1.1.4 JavaISIS 1.1.5 Other versions 1.2 General overview of CDS/ISIS for Windows 1.3 Record structure and record linking 1.4 The Windows version: the main menu 1.5 Availability of CDS/ISIS 1.6 Software contributed by users 1.7 User groups 1.8 Exchange formats 2 Overview of Windows 13 2.1 Introduction 2.2 Disk drives 2.3 The mouse 2.4 Files and file names 2.5 Folders 2.6 Features of Windows 2.6.1 The Window Bar 2.6.2 The Task Bar 2.6.3 Tabs 2.6.4 Other features of the bar 2.6.5 Menu Bar 2.6.6 Toolbar 2.7 Dialog boxes 2.7.1 Text entry box 2.7.2 List box 2.7.3 Combo box 2.7.4 Command buttons 2.7.5 Radio buttons 2.7.6 Spin box 2.7.7 Check box 2.8 You need to know!..
    [Show full text]
  • Conflicts and Religious Radicalisation in the Middle East 168
    Unmasking ‘Religious’ Conflicts and Religious Radicalisation in the Middle East 168 8 Unmasking ‘Religious’ Conflicts and Religious Radicalisation in the Middle East BETTINA KOCH Whether it is ‘Muslim-Hindu’ violence in India, ‘Christian-Muslim’ violence in Indonesia, ‘Buddhist-Muslim’ violence in Sri Lanka, ‘Sunni-Shia’ violence in Iraq, or, indeed, ‘Islamic terrorism’, the advertent follower of the news or reader of academic journals instantly encounters numerous references to contemporary or more recent conflicts that are deemed ‘religious’ or ‘sectarian’. The marker ‘religious conflict’ instantly implies a conflict has religious root causes, a conflict is fought in the name of and over religious causes. Thus, the qualifier ‘religious’ serves simultaneously as a description and as an analysis; although, too often, it is not obvious what an author means when they attach the qualifier ‘religious’ to a conflict.1 Moreover, reports of the number of religiously motivated casualties must be approached with caution; frequently, news reports suggest religious motives even in conflicts that are fought along ethnic or tribal lines, while the conflicting parties share similar religious outlooks (BBC News 2013). Consequently, whenever one aims at discussing conflicts that have a potentially religious background, it is mandatory to raise the question when and under what circumstances does a conflict qualify as a ‘religious’ or ‘sectarian’ conflict? Is it sufficient that at least one party in a conflict has a distinctively religious outlook or identity? Is it sufficient to have ‘religious’ language involved? Or is it essential that the conflict, in order to qualify as a religious conflict, is fought a) by using religious justification or b) over 1 This is even the case for the widely praised study by Brian and Finke (2011).
    [Show full text]
  • Volume X, Issue 2 April 2016 PERSPECTIVES on TERRORISM Volume 10, Issue 2
    ISSN 2334-3745 Volume X, Issue 2 April 2016 PERSPECTIVES ON TERRORISM Volume 10, Issue 2 Table of Contents Welcome from the Editor 1 I. Articles ‘Gonna Get Myself Connected’: The Role of Facilitation in Foreign Fighter Mobilizations 2 by Timothy Holman II. Special Correspondence to Perspectives on Terrorism Why Has The Islamic State Changed its Strategy and Mounted the Paris-Brussels Attacks? 24 by David C. Rapoport III. Research Notes Analysing the Processes of Lone-Actor Terrorism: Research Findings 33 by Clare Ellis, Raffaello Pantucci, Jeanine de Roy van Zuijdewijn, Edwin Bakker, Melanie Smith, Benoît Gomis and Simon Palombi Analysing Personal Characteristics of Lone-Actor Terrorists: Research Findings and Recommendations 42 by Jeanine de Roy van Zuijdewijn and Edwin Bakker Evaluating CVE: Understanding the Recent Changes to the United Kingdom’s Implementation of Prevent 50 by Caitlin Mastroe In Conversation with Mubin Shaikh: From Salafi Jihadist to Undercover Agent inside the “Toronto 18” Terrorist Group 61 Interview by Stefano Bonino IV. Resources Bibliography: Terrorism Research Literature (Part 2) 73 Compiled and selected by Judith Tinnes V. Book Reviews Counterterrorism Bookshelf: 30 Books on Terrorism & Counter-Terrorism-Related Subjects 103 Reviewed by Joshua Sinai ISSN 2334-3745 i April 2016 PERSPECTIVES ON TERRORISM Volume 10, Issue 2 VI. Notes from the Editor Op-Ed: Competing Perspectives on Countering ISIS 118 by Hashim Al-Ribaki Conference Announcement and Call for Proposals 120 About Perspectives on Terrorism 122 ISSN 2334-3745 ii April 2016 PERSPECTIVES ON TERRORISM Volume 10, Issue 2 Welcome from the Editor Dear Reader, We are pleased to announce the release of Volume X, Issue 2 (April 2016) of Perspectives on Terrorism at www.terrorismanalysts.com.
    [Show full text]
  • Course Syllabus Georgetownx
    TERRORISM AND COUNTERTERRORISM SEPTEMBER 24, 2015 – DECEMBER 2, 2015 Course Syllabus GeorgetownX August 31, 2015 GeorgetownX: Terrorism and Counterterrorism SEPTEMBER 24, 2015 – DECEMBER 2, 2015 TABLE OF CONTENTS Core Faculty ............................................................................................................................................................ 2 Interviews ............................................................................................................................................................... 4 Faculty Support Team ............................................................................................................................................. 4 What is the course about? ..................................................................................................................................... 5 Key Questions .................................................................................................................................................... 5 What does the course include? .............................................................................................................................. 5 Course Section Outline ....................................................................................................................................... 6 What will I learn in the course? .............................................................................................................................. 8 What should we expect from each
    [Show full text]