Terror in the Sinai


Book Description




Terrorism in the Sinai


Book Description

This report tracks and analyzes militant activity in the Sinai Peninsula. It focuses on the violence that has occurred since 2011, and particularly on the major increase in violence has been ongoing since July 2013. The project relies on open source intelligence to identify the reasons for the increase in violence and also determine the nature of the violence – who is carrying out the attacks and why. On July 3, 2013, the Egyptian military removed the democratically elected President Mohamed Morsi. What followed was an unprecedented increase in violence in the Sinai Peninsula. Since the fall of 2013, the violence has spread from the Sinai Peninsula into the mainland of Egypt. Hundreds of security personnel have been killed or injured since the uptick in the violence. After the coup that removed Morsi, there was a significant shift in the targets of attacks and the tactics used and this shift is indicative of the presence of the global jihadi network in the Sinai. Terrorist groups stopped targeting Israel and turned almost exclusively to Egypt security personnel. There has also been a major increase in suicide attacks, which indicates that there is a connection between the global jihadi network and Egyptian militant groups. The military is once again in control of Egypt’s government yet they have focused on consolidating political control instead of dealing with Egypt’s mounting security problem. The military has consistently insisted that the Muslim Brotherhood is behind the terror and ignored the true cause of the violence. This willful omission has allowed the terrorist groups in the Sinai to flourish and threaten security in mainland Egypt.




Sinai


Book Description

This report examines the attempts by the governments of Egypt, Israel and Gaza to protect what they view as their vital security and commercial interests, alternately perceiving Sinai as both a buffer against external predators and a weak unstable territory ripe for expanding their respective spheres of influence. Without a new political contract balancing the new power and trade relationships in the peninsula, Sinai's continued fragility could render it a proxy battleground for the surrounding powers. The report assesses the potential scenarios if deep-seated tensions remain unaddressed. The report concludes with a series of recommendations designed to forestall spiraling instability, not least by upholding the rights and aspirations of Sinai's indigenous people, and enhanced security coordination between the governments of Egypt, Israel and the Gaza Strip.




Egypt


Book Description




Sinai Subway


Book Description

For agent Duke Pirak, the coded text message on his phone is brief and to the point: "Go to Egypt to document militant link between Hamas and Muslim Brotherhood." At age sixty-two, Duke is surprised the NSA still requires his skills but is pleased he is still considered viable. This won't be his first trip to Cairo, and he is eager to return--and possibly see Sandi again after nine years apart.When Duke and Sandi reconnect, sparks do fly, but just as important as their rekindled relationship is the fact that Sandi is instrumental to Duke's new assignment: rescuing young girls who have been kidnapped and taken to the Sinai Peninsula to be sold as sex slaves.Set amid political turmoil and terrorist activity, Sinai Subway is a gripping thriller that almost seems too real to be fiction. Even so, it maintains a sense of humor and offers a love story, as well as an uplifting yet dramatic and edge-of-your-seat conclusion.




In the Sands of Sinai


Book Description

October 1973: A young physician in Israel prepares to celebrate the Jewish High Holidays with his wife and children. Suddenly a military invasion changes his life forever. This book chronicles the author's transformation from a civilian to a wartime doctor. In vivid personal details, the author Itzhak Brook, a veteran of both the Israeli Defense Forces and the United States Navy, recounts his first experience in war. He describes his own doubt and misgivings of being a physician facing the daily struggle of survival in the Sinai battle zone. Expecting to heal his soldiers' physical combat wounds, Brook unexpectedly must address his soldiers' psychological battlefield trauma. In unvarnished details from the mundane to the catastrophic, he describes his perspective of a war that shaped his own life, and his nation's fragile identity.




Hamas


Book Description

How does a group that operates terror cells and espouses violence become a ruling political party? How is the world to understand and respond to Hamas, the militant Islamist organization that Palestinian voters brought to power in the stunning election of January 2006? This important book provides the most fully researched assessment of Hamas ever written. Matthew Levitt, a counterterrorism expert with extensive field experience in Israel, the West Bank, and Gaza, draws aside the veil of legitimacy behind which Hamas hides. He presents concrete, detailed evidence from an extensive array of international intelligence materials, including recently declassified CIA, FBI, and Department of Homeland Security reports. Levitt demolishes the notion that Hamas’ military, political, and social wings are distinct from one another and catalogues the alarming extent to which the organization’s political and social welfare leaders support terror. He exposes Hamas as a unitary organization committed to a militant Islamist ideology, urges the international community to take heed, and offers well-considered ideas for countering the significant threat Hamas poses.




Misunderstanding Terrorism


Book Description

Misunderstanding Terrorism provides a striking reassessment of the scope and nature of the global neo-jihadi threat to the West. The post-9/11 decade experienced the emergence of new forms of political violence and new terrorist actors. More recently, Marc Sageman's understanding of how and why people have adopted fundamentalist ideologies and terrorist methods has evolved. Author of the classic Understanding Terror Networks, Sageman has become only more critical of the U.S. government's approach to the problem. He argues that U.S. society has been transformed for the worse by an extreme overreaction to a limited threat—limited, he insists, despite spectacular recent incidents, which he takes fully into account. Indeed, his discussion of just how limited the threat is marks a major contribution to the discussion and debate over the best way to a measured and much more effective response.




Terrorism Informatics


Book Description

This book is nothing less than a complete and comprehensive survey of the state-of-the-art of terrorism informatics. It covers the application of advanced methodologies and information fusion and analysis. It also lays out techniques to acquire, integrate, process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The book details three major areas of terrorism research: prevention, detection, and established governmental responses to terrorism. It systematically examines the current and ongoing research, including recent case studies and application of terrorism informatics techniques. The coverage then presents the critical and relevant social/technical areas to terrorism research including social, privacy, data confidentiality, and legal challenges.




Terrorism in Cyberspace


Book Description

The war on terrorism has not been won, Gabriel Weimann argues in Terrorism in Cyberspace, the successor to his seminal Terror on the Internet. Even though al-Qaeda's leadership has been largely destroyed and its organization disrupted, terrorist attacks take 12,000 lives annually worldwide, and jihadist terrorist ideology continues to spread. How? Largely by going online and adopting a new method of organization. Terrorist structures, traditionally consisting of loose-net cells, divisions, and subgroups, are ideally suited for flourishing on the Internet through websites, e-mail, chat rooms, e-groups, forums, virtual message boards, YouTube, Google Earth, and other outlets. Terrorist websites, including social media platforms, now number close to 10,000. This book addresses three major questions: why and how terrorism went online; what recent trends can be discerned—such as engaging children and women, promoting lone wolf attacks, and using social media; and what future threats can be expected, along with how they can be reduced or countered. To answer these questions, Terrorism in Cyberspace analyzes content from more than 9,800 terrorist websites, and Weimann, who has been studying terrorism online since 1998, selects the most important kinds of web activity, describes their background and history, and surveys their content in terms of kind and intensity, the groups and prominent individuals involved, and effects. He highlights cyberterrorism against financial, governmental, and engineering infrastructure; efforts to monitor, manipulate, and disrupt terrorists' online efforts; and threats to civil liberties posed by ill-directed efforts to suppress terrorists' online activities as future, worrisome trends.