首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 781 毫秒
1.
ABSTRACT

Why do women become extremists? To what extent might they have self-agency? This paper examines the motivations and processes of female radicalization into the so-called Islamic State (IS) by drawing on a case study of Indonesian IS sympathizers, including the three migrant workers-turned-female suicide bombers whose radicalization was facilitated by social media. It argues that far from being coerced, most women join IS of their own free will. Prompted by a mix of personal crisis and socioeconomic and political grievances, the women embark on a religious seeking, exploring the various Islamic options available to them. Ideational congruence might spark the initial interest in IS, but it is generally emotional factors such as a feeling of acceptance and empowerment that make them stay. Contrary to common assumptions, women’s subordination in jihadist organizations is not absolute; it can be negotiated after joining. Most women try to conform to jihadist strict gender rules, but some, often with the support of male allies, try to bend the norms, including on female combat roles. The findings suggest that counter-terrorism agencies should abandon the binary view that women are either just brainwashing victims or terrorist provocateurs, and try to understand the gendered nuances of radicalization in order to formulate suitable preventive measures.  相似文献   

2.
3.
ABSTRACT

This article provides a study of how the Malaysian state defines and redefines “terror” as the nature of militancy changes from the Communist insurgency to present day’s Islamist jihadism. Tracing such definitional changes, the article demonstrates how the portrait of a terrorist not only is inherently political (and at certain junctures, politicised), but also reflects the changing nature of the state. While able to ethnicise and externalise the Communist Terrorists (CTs), the rise of Islamist militancy forced the Malaysian state to shelve the term “terrorist” in favour of religious “deviancy” until the advent of the “war on terror”. Advancing along a state-driven Islamisation project, the discursive ideal that is the “Islamic state”, was securitised (1980–2001), normalised (2001–2013), and resecuritised (2014–2016) as a balancing act not only to neutralise the security threat but also to augment the state’s “Islamic” credentials for domestic political gains. Following the emergence of the Islamic State (IS), I argue that the Malaysian state is now embroiled in an “Islamic state versus Islamic State” dilemma, where in the face of a far enemy it cannot decisively eliminate, the state has no choice but to defend itself as a sovereign nation-state as well as an “Islamic” one, further problematising Islam in discourses of security and violence.  相似文献   

4.
This article uses a critical discourse and documentary analysis to explore “Good and Evil” narratives in Islamic State (IS) media and in the official policy statements of the United States, Australia and the United Kingdom. The analysis initially considers how IS and Western governments define the other as “Evil” drawing from premodern Manichean and Abrahamic religious conventions. It then interprets how these entities subscribe to a post-Enlightenment ethic that associates the triumph of “Good” over “Evil” with science, reason and technological innovation. Distinct from similar analyses that emphasise the persuasive power of religion, this article reflects on how IS and Western governments use conflicting religious and philosophical imperatives to articulate their strategic political agendas. It further interprets how these agendas become ideologically convincing, through reflexive communication.  相似文献   

5.
We describe a novel hybrid method of content analysis that combines the speed of computerized text analysis with the contextual sensitivity of human raters, and apply it to speeches that were given by major leaders of Al-Qaeda (AQ)—both in its “core” Afghanistan/Pakistan region and its affiliate group in Iraq. The proposed “Ideology Extraction using Linguistic Extremization” (IELEX) categorization method has acceptable levels of inter-rater and test-retest reliabilities. The method uncovered subtle (and potentially non-conscious) differences in the emphases that Usama Bin Laden and Ayman Al-Zawahiri put on the various components of their ideological justification for terrorism. We show how these differences were independently recognized as the crux of the rift in AQ, based on documents that were confiscated in Abbottabad following Usama Bin Laden’s assassination. Additionally, several of the ideological discrepancies that we detected between AQ “core” and its Iraqi affiliate correspond to schisms that presumably led to the splintering of AQ Iraq and the rise of ISIS. We discuss IELEX’s capability to quantify a variety of grievance-based terrorist ideologies, along with its use towards more focused and efficient counter-terrorism and counter-messaging policies.  相似文献   

6.
While many researchers have examined the evolution and unique characteristics of the Islamic State (IS), taking an IS-centric approach has yet to illuminate the factors allowing for its establishment in the first place. To provide a clearer explanation for IS’s successes and improve analysts’ ability to predict future occurrences of similar phenomena, we analyze IS’s competitive advantages through the lens of two defining structural conditions in the Middle East North Africa (MENA): failure of state institutions and nationhood. It is commonly understood that the MENA faces challenges associated with state fragility, but our examination of state and national resiliency shows that Syria and Iraq yield the most deleterious results in the breakdown of the nation, suggesting that the combined failure of state and nation, as well as IS’s ability to fill these related vacuities, is a significant reason IS thrives there today. Against this backdrop, we provide a model of IS’s state- and nation-making project, and illustrate IS’s clear competitive advantages over all other state and non-state actors in both countries, except for Kurdish groupings. We conclude with recommendations on how policy-makers may begin halting and reversing the failure of both state and nation in Iraq and Syria.  相似文献   

7.
The Labour government's counter-terrorism advice sought to distance ‘terrorism’ from Islam, but in doing so actually created an imagined relationship that potentially alienates those who follow the Islamic faith. This study works within the framework of labelling theory to demonstrate that the state's counter-terrorism advice was detrimental to its own goals. The study identifies labels within counter-terrorism discourse and argues that these create ‘the Islamic community’ using shared labels found in Islamist discourse and places the ‘threat’ within this imagined community. Identifying with a singular ‘other’ denies participation in multiple groups, creating an insular imagined society that constructs barriers and encourages persecution. Placing the ‘terrorist’ within this larger isolated community increases the possibility that the badge of honour found within its own group is seen as a status symbol to be mirrored within the wider community. Removing labels and empowering the individual, rather than creating artificial collectives, could provide a means of addressing the problem.  相似文献   

8.
《Orbis》2018,62(2):294-312
This article explores virtually planned attacks, an innovation by the Islamic State (IS) in its global campaign of terrorism. It argues that the United States and its allies have successfully combined military, intelligence, and law enforcement activities with border security measures in Turkey to reduce IS’ ability to send foreign fighters home to conduct attacks against the West. IS leaders have responded by relying on a team of virtual planners. These individuals use encrypted online messaging applications, such as Telegram Messaging or WhatsApp, to gather local recruits, provide them with technical expertise, and pick the target. Historically, virtually planned attacks in Europe and the United States have not been as successful as those executed by foreign fighters. But attacks in Southeast Asia may provide a forewarning of what is to come.  相似文献   

9.
This article explores online social media produced by the neo-jihadist group “Islamic State” (IS) from a political-economic perspective. Using a framework developed by anthropologist David Harvey, it examines how IS social media operates within depoliticised neoliberal environments characterised by “flexible” regimes of capital accumulation. It explicates how IS acquires political-economic capital by evoking “spectacle”, “fashion” and a “commodification of cultural forms”. Drawing from Christian Fuchs’ informational theory, the article also considers the roles of agency and competition in accumulation processes where “knowledge and technology reinforce each other”. By revealing how IS both constitutes and is constituted by its flexible approach to social media, the article seeks to illuminate avenues for better understanding neo-jihadist ideations.  相似文献   

10.
Tell me your enemy and I will tell you who you are. This article takes issue with the significant but often disavowed symbiotic relation between two contemporary enemies: fundamentalism and the politics of security. We start with a metaphorical twinning, showing how these two enemies create, provoke, mimic and ultimately support each other. Then, by way of a discourse analysis, we show the way religion functions in Bush's and Bin Laden's discourses. Our claim is not (only) that the discourse of security is as religious as Bin Laden's but that politics of security as such is the religion of our times. We conclude by arguing that the dyadic interdependence between the two fundamentalisms—Islamic and securiticised—is dissolving the democratic habitus in a post-political condition, a condition devoid of self-reflexivity.  相似文献   

11.
This study presents American state police agencies' perceptions about three significant terrorism and public safety issues. First, we asked about the threat posed by specified extremist groups nationally and to their state. We asked about the number of such groups and their supporters, and the number of activities each group participates in during a typical year in their state. We also asked about the number of criminal incidents each group commits and the number of their supporters arrested in a typical year. Second, we asked the agencies to rate the usefulness of fifteen specified terrorism sources. Third, we queried the agencies about their views of eight terrorism definitions. These data were collected by surveying the fifty state police agencies in the United States. We discovered widespread concern about the criminal activities of various extremist groups, with a particular concern about the threat of Islamic jihadists. Interestingly, although the top rated threat was Islamic jihadists, the respondents indicated that other types of groups were much more criminally active. Further, respondents indicated that various open and non-open sources were valuable terrorism sources. Finally, most respondents reacted more favorably to official terrorism definitions—especially the FBI's—as opposed to academic definitions. We conclude with a discussion of the policy implications of our findings and we outline directions for future research.  相似文献   

12.
There are limits on America's ability to bring democracy to deeply divided societies with little or no history of democracy, and many American liberal internationalists have succumbed to intellectual and moral paralysis about America's right and ability to spread its system in the rest of the world. The principles of law-governed freedom are in fact important and nearly eternal principles, but they are best spread by America's setting the example as a peaceful democracy. The messianic approach to democracy-promotion adopted by the Bush administration and its liberal allies, rooted in faith in the “American creed” and an emerging “global civil society,” can only damage both American power and the cause of democratizing the world. The American approach to democratization needs instead to be governed by rigor of the intellect and generosity of spirit.  相似文献   

13.
In recent years, thousands of radical citizens and residents from Europe have joined the so-called ‘Islamic State’ (IS) in Syria and Iraq. Unlike other European countries, Italy has traditionally been characterised by the prevalence of individual pathways of radicalisation over group mechanisms. Nevertheless, recent cases show interesting indications of the increasing role of small groups based on pre-existing personal relationships (family and friendship ties). This kind of bond can be particularly salient for IS, a jihadist “proto-state”, which needs not only ‘foreign fighters’ but also new ‘citizens’ of different sexes and ages, including entire families.  相似文献   

14.
Global publics and local actors are increasingly saturated with variegated still and moving images. The important role played by images in world politics, however, remains understudied in the International Relations (IR) discipline. This article argues that the Kurdish geopolitical space is increasingly tied to a new regional and global imagination, which emanates from verbalvisual meaning-making strategies such as narrative reconstructions and pictorial representations (for example illustrations, pictograms, or photographs). The article’s investigation illustrates how the construction of new Kurdish geopolitical imagination became increasingly regionalized and internationalized during the war against the so-called Islamic State (IS), particularly after the Kobane siege in Syria in late 2014. It shows how the war between the Syrian Kurdish forces and the IS involved gendered and aesthetic signification for the global and regional audiences. Such strategies of meaning-making served as vital venues for gendering and making the threat of the IS and its “distant war” proximate, familiar and urgent for otherwise disinterested western audiences. These verbalvisual strategies vitally acted as a transmission belt between individual, state and systemic levels, turning the struggle against the IS into a globalized cultural-symbolic war. The article employs critical visual semiotics and critical discourse analysis to investigate the regional and global politics of image and offers three empirical cases to illustrate its argument: the narratives of the Kobane siege; the cartoon depicting a “Kurdish homeland” and globally circulated Kurdish female fighter photographs.  相似文献   

15.
ABSTRACT

As the Islamic State (IS) caliphate in the Middle East has collapsed, it is seeking to extend its influence elsewhere, particularly in Europe where there are existing inter-communal tensions to exploit. IS has deployed the management of savagery doctrine through acts of terrorism as part of its strategy to increase polarisation by exacerbating fear and distrust among communities, encouraging sympathies for far-right actors among non-Muslims and potentially alienating counterterrorism policies by governments, pushing Muslims out of what it terms the ‘grey zone’. The desired outcome is to drain state resources and showcase Europe as hostile to Muslims, promoting the notion of a ‘war on Islam’.  相似文献   

16.
The so-called Islamic State (IS) has increasingly used water as a weapon in order to further its political and military aims in Syria and Iraq. In this water-scarce region, IS has retained water and cut off crucial supplies, flooded large areas as well as contaminated resources. The capture of large dams in the Euphrates and Tigris basin has made it possible to deploy the water weapon even more effectively and in a frequent, systematic, consistent and flexible manner. Measures to counter this weaponisation effectively have been limited to military means. However, several internal constraints create a dilemma for IS as its state-building ambitions conflict with the consequences of the weaponisation of water. The rebirth of using the water weapon in Syria and Iraq raises questions about protecting water infrastructures in conflict and post-conflict settings.  相似文献   

17.
Arab media is no longer limited to state-sponsored sources, opening a door of opportunity to the Muslim world. Islamic terrorist groups leverage information technology to form resilient, networked organizations that influence how many Muslims perceive events and U.S. political goals. This article looks at the connection between information technology and cultural transformation in the Middle East. It focuses on how information technology—as the major weapon system in the battle of ideas—has been used effectively by Islamic extremists and less so by the U.S. Important conclusions are drawn regarding the necessity of culturally-attuned uses of information technology.  相似文献   

18.
Contemporary research and policies often reduce Islamic insurgency to a simpli?ed notion of jihad, and, simultaneously, the religious doctrine of jihad to pure militancy. Such an approach fails to consider the complexities that de?ne and di?erentiate Islamic insurgents, and hinders further understanding of when, how and if they implement jihad. This paper attempts to address these shortcomings by considering how the ideological histories in?uencing territorially-based movements yield either an adherence to a modern jihad doctrine or a secular nationalist doctrine. Hezbollah in Lebanon and Hamas in the Palestinian Territories provide the case studies wherein this distinction is manifest in their respective popular bases, institutions and military relations. Responding to assumptions of an emergent ‘third form’ of jihad—the network—this study applies the inverse model of the territorial doctrines to the Arab-Afghans and al-Qaeda (the network headed by Osama bin Laden) in order to elucidate its potential explanatory limitations, as well asto o?er some insights.  相似文献   

19.
After having participated in the civil war and later ruled Afghanistan in the 1990s, the current Taliban have a third life as insurgents against the Afghan government and its foreign supporters. Their aim is to return to power and establish an Islamic system. Pakistani shelter and support, guerrilla warfare, and terrorist tactics allowed the Neo-Taliban to extend their influence, particularly to the south and east of Afghanistan. They used the weakness of the Hamid Karzai regime to set up shadow governments. Since even the coalition forces have abandoned the aim of defeating them, the Taliban are guaranteed survival after foreign combat troops leave Afghanistan at the end of 2014. Due to the different interests of the main stakeholders—the Afghan government, the Taliban, the United States, and Pakistan—it is unlikely that the conflict will end by negotiations any time soon. Thus, the civil war will continue. When the Taliban try to extend their reach beyond rural areas and into non-Pashtun districts, they will meet tough resistance. Therefore, it is likely that the fragmentation of Afghanistan will persist and that the Taliban will not return as rulers of a united Afghanistan.  相似文献   

20.
Abstract

In the beginning faith was the alpha and omega of revolutionary dreams and terrorist actions. This article will examine case studies among the Peoples of the Book—Judaism, Christianity, and Islam—for religious terrorism is not the product of one faith. It argues that the cultural resonance of each movement examined offers a blank slate on which contemporary seekers, dreamers, and fighters may write. The title, borrowed from a popular novel, is the leitmotif of this form of violence. By all objective forms of analysis, the movements chronicled in these pages are a parade of seemingly stupid ideas held by idealists, fools, and fanatics who dreamed that, with God at their side, they could bring perfection to a fallen world. In such a cause, antinomian violence is inevitable and genocide its logical outcome. Yet these early movements are not to be despised, for together it was they, not the huddled masses cowering before the powers that be, that created the modern world.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号