首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Despite the traditional restrictive views of Islamic jurisprudence on women's social activities, the level of women's incorporation into jihadi organizations is growing rapidly in both numbers and roles. This article argues that this increase reflects a strategic logic—jihadi groups integrate women to enhance organizational success. The article develops a typology of jihadi organizations: operation-based and state building and argues that the strategic logic of women in operation-based organizations lays in the tactical advantages women provide them. However, for state-building jihadi groups, the strategic logic of women is geared toward addressing the challenges facing a functioning state.  相似文献   

2.
This article provides a detailed examination of how the Salafi-jihadi movement perceives the “Arab Spring” revolutionary events. Although Western scholars almost unanimously agree that these events will have an enormous impact on Al Qaeda and other groups that share its ideology, the voice of the jihadis has not been examined in detail. This article addresses this critical gap in the literature through an analysis of 101 significant documents produced by jihadi thinkers within a year following the movement's very first statement on the uprising in Tunisia. These include statements released by jihadi spokesmen, interviews with the movement's intellectual leaders, and discussions on jihadi Web forums. The article concludes that Al Qaeda and the jihadi movement largely believe that the uprisings provide them a great deal of new opportunities, and outlines the movement's developing strategy to capitalize on rapidly changing events on the ground.  相似文献   

3.
Abstract

This research argues that an imagined artifact, the IS coins, serves as a transhistorical artifact, condensing the larger ideology of the violent extremist organization of legitimacy and sovereignty. This paper conducts a qualitative content analysis on all references to IS Coin within Dabiq, al-Naba, Rumiyah and all the official videos publicized in the above magazines from April 2014 to September 2018. The power of one artifact, in this case, coin, embodies the whole ideology of ISIS and transports the ideology from the past to the present to the future and the artifact belongs to daily life, amplifies its power.  相似文献   

4.
This article focuses on the neutralizations of the jihadi Salafi ideology. It is divided into three parts. The first describes the various rhetorical accounts that ordinary people use to neutralize conventional moral controls against inhumane conduct. The second traces how these accounts inform and drive the jihadi Salafi worldview. The third, and concluding, part of the article sketches out the policy implications of the analysis set out here, arguing that any attempt to derail the global Salafi jihad must critically undermine the core neutralizations of the jihadi Salafi ideology, since it is these which enable jihadi combatants to escape conventional moral constraints and perpetrate acts of inhumanity.  相似文献   

5.
6.
Abstract

“Twister,” developed by Miguel Freitas, is a social network platform centered around micro-blogging, much like Twitter. However, rather than relying on centralized servers owned and maintained by a single firm, Twister users operate a blockchain combined with distributed hash table (DHT)–like and BitTorrent-like protocols to both make posts and send private messages, and also to receive entries from other users. Twister’s raison d’etre is that it offers a social networking platform that cannot be censored and cannot itself censor. The software does not record the Internet Protocol addresses users use to access the service, nor does it notify other users of an account’s online/offline status. Growing adoption of blockchain services means that it is possible that the concept of decentralized social networks could become a norm. It is suggested in this article that blockchain-based peer-to-peer social networks present challenges to the current counterextremist practices for content removal and censorship. While there are methods to disrupt usage of blockchain-based peer-to-peer services, these approaches may have the net harm of curtailing bona fide use of legal and novel technologies. Given this opportunity cost, non-transitory online violent extremist content may need to be tolerated.  相似文献   

7.
This article deals with the attempts by the radical Islamist ideologue Abu Muhammad al-Maqdisi to reclaim scholarly authority over jihad, a phenomenon he has helped promote but that has led to excesses he disagrees with and has increasingly become the prerogative of fighters instead of scholars. These attempts by al-Maqdisi to reassert his own jihadi authority are expressed through criticism of certain jihadi practices and advice to jihad fighters. Because al-Maqdisi has been in the forefront of radical scholars calling for jihad, his criticism has been dismissed by some jihadis as revisionism of his earlier views and as the words of a man lacking any fighting experience himself. This article argues that al-Maqdisi's criticism of certain jihadi practices does not constitute revisionism of his earlier views but is an effort to take greater scholarly control of the jihadi trend that he has partly inspired but which—in the hands of militants—has also developed beyond what he sees as useful and even Islamically legitimate.  相似文献   

8.
This article argues that video games have become a valid and increasingly significant means of jihadist digital propaganda. “Gaming jihad” has recently shown interesting alterations, mostly due to actions undertaken by the so called Islamic State and its cyber-partisans, which have discovered new ways of using this flexible and immersive medium. Similar to more conventional forms of its online propaganda, which have been imitated by other Islamist terrorist groups for years, the “Caliphate's” exploitation of electronic entertainment software may be a forerunner for the increased interest of other violent extremist organizations in this medium.  相似文献   

9.
A comparative analysis of Islamic extremism post-9/11 to 2015 and the effectiveness of the counterterrorism (CT) authorities to counter it in both Western Europe and the United States was conducted. Four measures of effectiveness revealed that 2010–2015 saw a gradual increase in jihadi attacks and in casualties emanating from these attacks, and more jihadists, foreign fighters, and material supporters. Additionally, 2013–2015 saw a 22 percent reduction both in Western Europe and the U.S. CT agencies' ability to counter Islamic extremism. We are losing the War on Terror and our citizens are less safe than they were six years ago. Further analysis revealed that singleton jihadists: (1) were much harder than group-based jihadists to uncover, (2) have been increasing since 2009, and (3) have generated over 70 percent of all jihadi violence. Finally, numerous similarities exist between Western Europe and the United States with respect to jihadism in their homelands and their respective CT effectiveness, indicating close cross-Atlantic CT collaboration since 9/11. This in-depth analysis provides essential threat/hazard information to security, law enforcement, intelligence, and policymaking personnel and the greater homeland security communities.  相似文献   

10.
The field of terrorism research has arguably long been characterized by a separation of the scholars from their subject of inquiry. Interviews can be used to bridge this chasm, but making contact with potential interviewees, conducting interviews, and analyzing the data pose unique challenges when conducting research into jihadists, especially active ones. This article focuses on the author's experience of interviewing both former and active jihadi foreign fighters. It is specifically intended to contribute to a better methodological understanding of conducting first-hand empirical research into jihadi foreign fighters and builds on fieldwork conducted in Sweden, Iraq, and Lebanon.  相似文献   

11.
Several novels have attained popularity in the extreme right subculture, most notably, The Turner Diaries—a tale of race war that convulses America. Some observers have characterized these novels as blueprints for revolution and terrorist campaigns. The medium of fiction can be an effective vehicle for propagandizing to those persons who may not be amenable to non-fiction political treatises. This article reviews some of the more popular extremist novels. By doing so, it provides insight into the worldviews and aspirations of the contemporary extreme right.  相似文献   

12.
Groups of second- and third-generation Muslim immigrants in Europe are increasingly undergoing radicalization processes that can lead to violent activity. These immigrants find relief for their frustrations in global jihadi ideology and radical Islam. In seeking to understand these radicalization processes within the European context, the author draws lessons from the Palestinian territories of the West Bank and Gaza on the eve of the “First Intifada” (popular uprising) in 1987. While these cases have different root causes and implications, the author's comparative analysis demonstrates that the social processes and generational clashes that lead to radicalization are shared by the two arenas.  相似文献   

13.
Turkish support to jihadists is not merely a tactic aimed at removing Assad from power. It stems from a strategic decision on the part of Turkish authorities to influence Middle East affairs through non-state actors, much as Iran has been doing for some time. Turkey's support of jihadists transiting into Syria and its establishment of close ties with Hamas and the Muslim Brotherhood are joint aspects of this strategy. Turkish authorities have permitted Al Qaeda sympathizers to use pro-government media to promote their beliefs. The authorities have adopted a new political language that fuels anti-American and anti-Western sentiments. Prosecutors who have attempted to prevent shipments of weapons to Al Qaeda–affiliated groups in Syria have been fired and in some cases incarcerated. Indeed, by now Turkish prosecutors and the Turkish National Police are thoroughly intimidated. Not a single counterterror operation has been launched to disrupt Islamic State of Iraq and Syria (ISIS)’s networks or recruitment activities. The Turkish National Intelligence Organization has been given full responsibility to deal with jihadist activities, without any active oversight, and the police are loath to venture into their territory. As a member of the North Atlantic Treaty Organization, Turkey's jihadi policies have direct and indirect impact on Western security. This article examines Turkey's jihadi policies by examining official statements, media reports, interviews, and fieldwork.  相似文献   

14.
Abstract

This study examines the smuggling of Indian citizens to other countries and aims at gaining an insight into the modus operandi of the smugglers. It is based on an empirical study of deportation cases of Indian citizens from other countries.

About three-quarters of the deportees who accessed the services of smugglers belonged to the State of Punjab. Almost 80 per cent of the deportees were young and in the age group of 18-30. About 28 per cent of the deportees succeeded in reaching their countries of destination with the help of smugglers. Thus, the success rate of illegal migration with the help of smugglers is higher by more than quarter than without them.

Individual deportees had paid sums varying from US$ 2000 to US$ 10,000 to smugglers. No correlations have been observed between the countries of destination and the amounts paid to smugglers.

The study has shown that smuggling of aliens is carried out by professional organizations with links in the countries of source, transition, and destination. The study concludes that so long as opportunities for legal migration are limited there will always be a demand for smugglers. In order to prevent and control smuggling an international co-operation among countries of source, transition, and destination would be imperative. It would also be desirable to widen the ambit of legal migration for low-skill jobs like in agriculture, construction works, and service sectors for limited periods through country-specific bilateral agreements.  相似文献   

15.
This article delineates and analyzes the phenomenon of the Palestinian suicide bombing campaign. Two central and distinct periods are proposed in the article in reference to this phenomenon; the first spans from 1993–2000 and the second from 2000 onward. The two periods are differentiated by an increased level of intensity in the second period, an enlarged number of participating organizations and volunteers that occurred following the blockade of the peace process that was initiated through the Oslo Accords. This article examines several aspects of Palestinian suicide terrorism including manners of recruitment, persuasion, modus operandi, and concurrently, it observes the Israeli countermeasures and their ramifications.  相似文献   

16.
In recent years, a growing body of empirical research suggests that indiscriminate violence against civilian targets tends to carry substantial political risks compared to more selective violence against military targets. To better understand why terrorist groups sometimes attack politically suboptimal targets, scholars are increasingly adopting a principal-agent framework where the leaders of terrorist groups are understood as principals and lower level members as agents. According to this framework, terrorist leaders are thought to behave as essentially rational political actors, whereas lower level members are believed to harbor stronger non-political incentives for harming civilians, often in defiance of leadership preferences. We test this proposition with an original content analysis of terrorist propaganda videos. Consistent with the principal–agent framework, our analysis demonstrates statistically that terrorist leaders tend to favor significantly less indiscriminate violence than their operatives actually commit, providing unprecedented insight into the incentive structure of terrorist leaders relative to the rank-and-file.  相似文献   

17.
What effects does a revolution have on the stability or change of a hybrid regime? Has the Ukraine's regime changed since the 2014 revolution? To answer these questions I examine the changes in formal and informal institutions and the quantitative and qualitative composition of elites after the change of power in Ukraine in 2014. I argue that despite greater than in the post-orange period quantitative renewal of elites, qualitative change has not occurred. Meanwhile, the old operational code, or modus operandi, of elites' political culture, composed of clientelism, secretive deals and quota based nominations to government positions continues to operate. The lack of elites' renewal and the dominance of informal rules over formal procedures – two factors that keep the institutional core of Ukraine's hybrid regime unchanged.  相似文献   

18.
Abstract

Online countermessaging—communication that seeks to disrupt the online content disseminated by extremist groups and individuals—is a core component of contemporary counterterrorism strategies. Countermessaging has been heavily criticized, not least on the grounds of effectiveness. Whereas current debates are focused on the role of government and large organizations in developing and disseminating countermessages, this article argues that such approaches overlook the informal production of countermessages. Recognizing the appetite for “natural world” content among those engaged in countermessaging, this article highlights some of the potential benefits of informal approaches to countermessaging. At the same time, the article also acknowledges the risks that may result from closer working between countermessaging organizations and informal actors.  相似文献   

19.
This article compares and contrasts the responses to right-wing extremism in the United States and the Federal Republic of Germany. Essentially, the approaches of these respective countries represent two polarities on a continuum. Whereas in theory, the United States allows extremist groups much more freedom to espouse unpopular ideas, the Federal Republic of Germany has the legal authority to disband extremist groups and parties that it deigns a threat to the country's constitutional democracy. Despite these seeming differences, both countries have responded resolutely to manifestations of right-wing extremism and have actually cooperated on numerous occasions to stymie American extremist activists that have propagandized in Germany. There are advantages and disadvantages to the approaches these two countries employ in countering extremism.  相似文献   

20.
Recent Al Qaeda threats and related jihadi propaganda potentially herald a new weapon in the terrorist arsenal: the deliberate setting of forest fires and other conflagrations both to terrorize society and wreck untold economic damage. Beyond the immense, new burdens that would be placed on emergency response personnel, these fires could also create grave environmental crises causing severe pollution from gases escaping into the atmosphere. The strategy of “Forest Jihad,” now being championed by Al Qaeda strategists, is supported and justified theologically by radical Islamic scholars. With this new weapon, the terrorists believe, maximum physical and financial damage can be inflicted to targeted countries at comparatively little risk.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号