共查询到20条相似文献,搜索用时 0 毫秒
1.
Matthew G. Devost Brian K. Houghton Neal Allen Pollard 《Terrorism and Political Violence》2013,25(1):72-83
Information warfare represents a threat to American national security and defense. There are two general methods in which a terrorist might employ an information terrorist attack: (1) when information technology (IT) is a target, and/or (2) when IT is the tool of a larger operation. The first method would target an information system for sabotage, either electronic or physical, thus destroying or disrupting the information system itself and any information infrastructure (e.g., power, communications, etc.) dependent upon it. The second would manipulate and exploit an information system, altering or stealing data, or forcing the system to perform a function for which it was not meant (such as spoofing air traffic control). A perennial dilemma of combating terrorism in a democratic society is finding the right balance between civil liberties and civil security. The special problems associated with IT are examined. The US national security establishment needs to use a flexible, integrated response to counter information terrorists ‐ one which employs information warfare tactics tailored to counter gray‐area phenomena, but which also pools resources from ‘conventional’ counter‐terrorism and law enforcement authorities. 相似文献
2.
Manuel R. Torres Javier Jordán Nicola Horsburgh 《Terrorism and Political Violence》2013,25(3):399-421
The Global Jihadist Movement (GJM) has a series of well-defined objectives, which constitute the central points of their ideology. In the realization of these goals, propaganda and public communication play a central role. This article studies the evolution of the principal characteristics of GJM propaganda, analyzing over 2,000 documents issued by the GJM between 1996 and 2005. 相似文献
3.
Al Qaeda in the Arabian Peninsula’s Inspire magazine has received attention within Western academia and media for its role in inspiring and instructing a series of homegrown terrorist attacks. Reporting on the magazine often characterises it as a Western-centric instrument of jihadi discourse. This characterisation, while broadly accurate, is in need of refinement. Using a modified version of Jennifer Attride-Stirling’s method of thematic network analysis, this research visualises and analyses the narrative themes contained within fourteen issues of Inspire magazine. It demonstrates that the magazine’s narrative extends well beyond the Western world. In reality, Inspire’s themes centre not only on the West and its Muslim populations, but on local politics and broader religious issues. The magazine’s thematic focus has also shifted over time—particularly in response to (a) political volatility in the Middle East and North Africa, (b) the killing of prominent jihadists, and (c) the execution of successful individual jihad operations. Throughout these periods of change, Inspire struggled to maintain focus on its anti-Western narrative and proved easily distracted by local issues and the “martyrdom” of Al Qaeda leaders. Understanding Inspire’s thematic landscape and its shifting character prove important in understanding and responding effectively to its jihadi discourse. 相似文献
4.
5.
This paper deals with NATO’s ability to contribute to the war on terrorism. The paper highlights the difficulties that the
organization has encountered in dealing with a threat that is entirely different from the one that the organization was created
to deal with. The paper discusses NATO’s new policies, al Qaeda’s transformation since 9/11, and the nature of terrorism.
The paper suggests that although NATO has drafted a number of new antiterrorist policies they are all premised on the idea
of fighting a war against terrorism as if terrorism were a well defined military enemy. We conclude by arguing that the organizational
behavior demonstrated by NATO is consistent with what Graham Allison and Philip Zelikow predict in their organizational process
model and that many of the difficulties encountered by NATO in the war against terrorism are due to the nature of the organization.
An erratum to this article is available at . 相似文献
6.
Fernando Lopez‐Alves 《Terrorism and Political Violence》2013,25(2):202-241
In this article we offer a first attempt at providing a set of universal grading criteria for determining on what basis, and how far, an item of discursive content can be considered “terroristic.” In doing so, we draw loosely on the existing COPINE scale for child abuse images. The scale described in the article is not intended to reflect actual risk of engagement in terrorist violence, nor is it intended to have evidential validity in relation to offenses in certain jurisdictions relating to “terrorist publications.” Rather, by formalising assumptions which seem already to be latent in the literature on terrorist use of the Internet, it aspires to serve as a starting point for a more methodologically coherent approach to relationships between content—particularly online content—and terrorism. 相似文献
7.
Jonathan Kennedy 《Terrorism and Political Violence》2013,25(2):201-212
The current age of technology, mass communication, and globalization makes networks analysis an especially useful tool for understanding cell-based terrorism. Some concepts from traditional networks analysis may be especially relevant. The Strength of Weak Ties hypothesis (SWT) is particularly promising and will be used here to demonstrate the usability of traditional networks analysis for studying modern terrorism. The findings suggest that the strength of weak terrorist ties may improve Al Qaeda's operational capabilities despite the group's decentralization following the U.S.-led military campaign in Afghanistan beginning in 2001. 相似文献
8.
R. Kim Cragin 《Terrorism and Political Violence》2014,26(2):337-353
Although much has been written about how and why individuals become terrorists, very little research has focused on why individuals choose not to become involved in political violence. Some assume that these non-radicalized individuals simply have not had the same life experiences as terrorists. Yet one only has to explore areas of conflict, such as the Gaza Strip, northwest Pakistan, or the southern Philippines, to wonder why more individuals have not joined local militant groups. This article presents a conceptual model ofnon-radicalization in an attempt to move the discussion forward on this topic. It argues that it is impossible to understand radicalization pathways, or design policies to preempt them, without a complementary knowledge ofwhy individuals resist the influence ofviolent extremism. 相似文献
9.
John Turner 《Terrorism and Political Violence》2013,25(4):541-558
Al Qaeda after the invasion of Afghanistan can now be understood as not only an international terror organisation but an ideology which inspires groups with similar goals of a supranational caliphate. The Al Qaeda ideology draws from long standing historical Islamic concepts that date to the time of Muhammad. The ideologues of the organisation, most notably Ayman al Zawahiri, have cleverly used these ideas and the works of other Islamists to create not just a terror organisation but an ideology designed to unite disparate groups of Islamic radicals around the world. 相似文献
10.
11.
《Terrorism and Political Violence》2012,24(1):20-37
ABSTRACTOn June 29, 2014, the Islamic State emerged and declared the establishment of its caliphate. The declaration was a direct challenge to other Sunni Jihadi groups including Al Qaeda and an attempt to become the leading Jihadi group around. The rivalry that evolved within Sunni Jihadism, and particularly between Al Qaeda and its renegade affiliate the Islamic State, entailed a hitherto unseen competitive environment within the Jihadi field. Interestingly, the increased competition did not lead to a dynamic of competitive escalation and mutual radicalization of behaviour. Theory tells us to expect competitive escalation, or outbidding, in such contexts, but despite the initial success of the Islamic State’s brutality and offensive conquest in Syria and Iraq, Al Qaeda did not “play along” and instead pursued a different path. The reason for this absence of competitive escalation, this paper argues, is to be found in a pre-conflict methodological re-orientation within Al Qaeda and in the pacifying role played by influential Al Qaeda-affiliated ideologues. 相似文献
12.
Anne Stenersen 《Terrorism and Political Violence》2013,25(2):215-233
This study aims to investigate how Al Qaeda uses the Internet for military training and preparation. What kind of training material is available on jihadi webpages, who produces it, and for what purpose? The article argues that in spite of a vast amount of training-related literature online, there have been few organized efforts by Al Qaeda to train their followers by way of the Internet. The Internet is per today not a “virtual training camp” organized from above, but rather a resource bank maintained and accessed largely by self-radicalized sympathizers. 相似文献
13.
Joshua D. Freilich William S. Parkin Jeff Gruenewald Steven M. Chermak 《Terrorism and Political Violence》2013,25(5):943-965
ABSTRACTThis study explores differences in perpetrators of suicide attacks and non-suicide attacks in the United States. The study uses data on far-right and Al Qaeda and affiliated/inspired terrorists between 1990 and 2013 from the United States Extremist Crime Database. Our analysis estimates logistic regression models to test whether suicide attackers were more likely to have exhibited specific risk factors for suicidality, while examining other prominent claims regarding patterns of suicide terrorism. Suicide attackers were no more likely than non-suicide attackers to have previously attempted suicide or to have been diagnosed as mentally ill. Suicide attackers were more likely, though, to have a history of substance abuse, to be loners, have served in the military, participated in paramilitary training, and be more ideologically committed to the cause. We found that Al Qaeda affiliated/inspired attackers were more likely than far-right attackers to have engaged in a suicide mission. With the current focus on Americans traveling to Syria and Iraq to receive training and fight for jihadist movements (e.g., the Islamic State), our findings appear relevant. Observers have expressed concern that these fighters may return and then commit attacks in their homeland. Law enforcement could make use of this study’s findings. 相似文献
14.
Despite several overlaps between crime and terrorism, criminological examinations of terrorism to date have been limited. To fill this gap in the research, we examine several individual and contextual socio-demographic characteristics of a diverse sample of extremists operating in the United States who have committed violent crimes. In addition, we provide a comparative analysis to explain and understand differences between extremists who have committed violent crimes while active in either far-Right, far-Left (including environmental and animal rights extremists), or Al Qaeda and affiliated movements. To assess the impact of external factors on the nature of domestic extremist violence, we also comparatively examine these three types of domestic extremists before and after the September 11, 2001 terrorist attacks. We find several similarities across domestic extremists but many important suspect- and county-level differences as well. We end the paper with suggestions for future research that could extend the criminological study of terrorism. 相似文献
15.
Eric Stollenwerk Thomas Dörfler Julian Schibberges 《Terrorism and Political Violence》2016,28(5):950-970
Network analysis has attracted significant attention when researching the phenomenon of transnational terrorism, particularly Al Qaeda. While many scholars have made valuable contributions to mapping Al Qaeda, several problems remain due to a lack of data and the omission of data provided by international organizations such as the UN. Thus, this article applies a social network analysis and subsequent mappings of the data gleaned from the Security Council's consolidated sanctions list, and asks what they can demonstrate about the structure and organizational characteristics of Al Qaeda. The study maps the Al Qaeda network on a large scale using a newly compiled data set. The analysis reveals that the Al Qaeda network consists of several hundred individual and group nodes connecting almost all over the globe. Several major nodes are crucial for the network structure, while simultaneously many other nodes only weakly and foremost regionally connect to the network. The article concludes that the findings tie in well to the latest research pointing to local and simultaneously global elements of Al Qaeda, and that the new data is a valuable source for further analyses, potentially in combination with other data. 相似文献
16.
Al Qaeda in the Arabian Peninsula has positioned itself at the vanguard of a media revolution in which terrorist groups both create and frame news events to an unprecedented extent. Through the publication of its e-magazine Sada al-Malahim (The Echo of Epic Battles), the organization has sought to mobilize both Yemeni and non-Yemeni Muslim, Arabic-speaking audiences to carry out violent jihad. This article utilizes the concept of collective action frames to analyze Al Qaeda in the Arabian Peninsula's media output, identifying the organization's grievance narratives, ideological justifications for violent actions, and means to strengthen its credibility among its intended audiences. 相似文献
17.
Martin Durham 《Terrorism and Political Violence》2013,25(1):65-79
The devastating explosion in Oklahoma City on 19 April 1995 has drawn attention to the existence of citizen militias and the Patriot movement of which they are part. Opposed to gun control and taxation and strongly influenced by claims of concealed foreign troops, concentration camps and plans to impose a New World order, Patriots are the inheritors of a radical rightist conspiratorialism dating back to the 1960s. Believing American liberties to be as threatened by Oliver North as by President Clinton, the movement is a diffuse subculture which encompasses both racist adherents of what is termed Christian Identity and more traditional Christian fundamentalists (and even includes some members of ethnic minorities). The Oklahoma bombing, it believes, was the work of forces seeking to demonize the movement but while it argues that the creation of militias is purely defensive, there is a constant danger of confrontation with the state in the rhetoric of a second American Revolution. 相似文献
18.
Elena Pokalova 《Terrorism and Political Violence》2018,30(3):408-427
Al Qaeda leaders have consistently praised the Chechen insurgents as an exemplary front of global jihad. Ayman al-Zawahiri recently applauded the steadfastness of the Chechen rebels and indicated that their resolve for jihad is worthy of emulation. Ever since the world found out about a war going on in the Muslim republic in the North Caucasus, Al Qaeda leadership has attempted to represent the Chechen struggle as one of its own battlefields. In turn, the Russian government has tried to justify its policies in the North Caucasus through demonstrating to the world that the Kremlin is fighting nothing less than Osama bin Laden’s agents in Chechnya. The North Caucasus insurgents in turn have embraced some of Al Qaeda’s narratives. While such narratives have proliferated, the factual evidence to show the direct links between the North Caucasus insurgents and Al Qaeda is still lacking. The article examines how terrorist groups such as Al Qaeda use framing for strategic ends. The evidence discussed here suggests that Al Qaeda, the North Caucasus insurgents, and the Russian government have adopted similar narratives. However, the lack of evidence to back up such narratives indicates the differences in reasons driving the convergence of the narratives. 相似文献
19.
Paul Kamolnick 《Terrorism and Political Violence》2017,29(3):444-463
Adam Gadahn's Abbottabad letter offers a rare opportunity to examine how this Al Qaeda Senior Leadership (AQSL) media operative and spokesman conceptualizes and executes media warfare. In this article, I first introduce, depict, and employ the author's Terrorist Quadrangle Analysis (TQA) as a useful heuristic for conceptualizing and representing the four interrelated components of the AQSL terrorist enterprise: political objectives, media warfare, terrorist attacks, and strategic objectives. This TQA construct is then employed to conceptualize Gadahn's media warfare acumen. Gadahn is shown to be an adept communications warfare operative who conscientiously disaggregates and evaluates key target audiences, messengers, messaging, and media. Gadahn's vehement critique of select “jihadi” groups, in particular Tehrik-i-Taliban (TTP), al-Shabaab, and the Islamic State of Iraq (ISI), is then described. Key here is how and why Gadahn denounces their indiscriminate, murderous terrorist attacks on Muslim non-combatant civilians and other protected persons as effectively subverting his intended AQSL media warfare strategy and undermining AQSL strategic and religio-political objectives. A concluding section briefly summarizes these chief findings, offers select implications for scholarship and counter-AQSL messaging strategy, and identifies study limitations. 相似文献
20.
Matthew G. Devost Brian K. Houghton Neal Allen Pollard 《Terrorism and Political Violence》2013,25(1):95-97
Research on the motives of those who engage in small group political violence typically takes a qualitative or quantitative form. I argue that researchers should seek to understand why people engage in small group political violence, and that the best way to achieve such understanding is to employ both. The advantages of this approach are discussed in this paper, as is the importance of recognizing that the activities of all actors in any given violent location, including state actors, should be accounted for in research. 相似文献