The Al-qaeda Organization and the Islamic State Organization


Book Description

The al-Qaeda Organization (AQO) and the Islamic State Organization (ISO) are transnational adversaries that conduct terrorism in the name of Sunni Islam. It is declared U.S. Government (USG) policy to degrade, defeat, and destroy them. The present book has been written to assist policymakers, military planners, strategists, and professional military educators whose mission demands a deep understanding of strategically-relevant differences between these two transnational terrorist entities. In it, one shall find a careful comparative analysis across three key strategically relevant dimensions: essential doctrine, beliefs, and worldview; strategic concept, including terrorist modus operandi; and specific implications and recommendations for current USG policy and strategy. Key questions that are addressed include: How is each terrorist entity related historically and doctrinally to the broader phenomenon of transnational Sunni "jihadism"? What is the exact nature of the ISO? How, if at all, does ISO differ in strategically relevant ways from AQO? What doctrinal differences essentially define these entities? How does each understand and operationalize strategy? What critical requirements and vulnerabilities characterize each entity? Finally, what implications, recommendations, and proposals are advanced that are of particular interest to USG strategists and professional military educators?




The Strategy of Terrorism


Book Description

This is the first book to set out a comprehensive framework by which to understand terrorism as strategy. It contends that even terrorism of the supposedly nihilist variety can be viewed as a bona fide method for distributing means to fulfil the ends of policy, that is, as a strategy. The main purpose of the work is to describe the dynamics of terrorism and evaluate their effectiveness, as well as to theorize upon, and clarify the correlation between, political ends and terrorist means. The text explains the modus operandi of terrorism, and demonstrates how terrorism relies on manipulating the psychological impact of (usually) relatively small-scale attacks. Using a variety of case studies, The Strategy of Terrorism shows how many campaigns of terrorism end in failure when they lose their power to terrify. The authors spell out what a proper understanding of terrorism as a strategy implies for those who want to make terrorism ineffective, and offer a number of policy recommendations derived directly from their critique. This is the first contribution of strategic studies to the study of terrorism, and will be of much interest to students of terrorism, strategy and security studies, as well as military professionals and policy makers.




Understanding Terrorist Innovation


Book Description

This book explores the innovations and advances in terrorist tactics and technologies to help fill the gap in the contemporary terrorism literature by developing an empirical theory of terrorist innovation. The key question concerns the global historical trends in terrorist innovation, as well as the critical factors responsible for the differences in practices among terrorist organizations. The first part of the book provides an overview of the tactics and technology used by terrorists in the last century and identifies the key trends for the future. The second part compares four differing terrorist organizations with the aim of identifying key factors in producing innovative tactics and weaponry. The volume provides a historical explanation of the trends in terrorist innovation and also has policy relevance, as the ability to identify signature characteristics of innovation-prone terrorist organizations is a critical element in predictive threat assessment. Understanding Terrorist Innovation will be of great interest to students of terrorism studies, security studies and political science in general.




Transnational Terrorist Groups and International Criminal Law


Book Description

Attacks by network-based transnational terrorist groups cause on average 25,000 deaths every year worldwide, with the law enforcement agencies of some states facing many challenges in bringing those responsible to justice. Despite various attempts to codify the law on transnational terrorism since the 1930s, a crime of transnational terrorism under international law remains contested, reflecting concerns regarding the relative importance of prosecuting members of transnational terrorist groups before the International Criminal Court. This book critically examines the limits of international criminal law in bringing members of transnational terrorist groups to justice in the context of changing methods of warfare, drawing from human rights, sociology, and best practices in international criminal justice. Drawing on organisational network theory, Anna Marie Brennan explores the nature of international crimes and assesses the potential for the International Criminal Court to prosecute and investigate alleged crimes perpetrated by members of transnational terrorist groups, paying particular attention to their modus operandi and organisational structure. This book argues that because of the network-based organisational structure of some transnational terrorist groups, achieving justice for victims will prove challenging, in the context of the relationship between the commanders and the subordinate members of the group requiring a re-evaluation of accountability mechanisms at the international level. In advancing an innovative perspective on the accountability of members of transnational terrorist groups, and in offering solutions to current challenges, the book will be of great interest and use to academic, practitioners, and students engaged in the study of terrorism, the ICC, or international humanitarian law.




Jihadist Infiltration of Migrant Flows to Europe


Book Description

This book explores one of the most topical and controversial issues of recent years –jihadist terrorist infiltration of irregular migrant flows to Europe. Utilizing robust sampling criteria, more than a hundred such cases are identified and rigorously assessed. The analysis reveals the characteristics of offenders, their travel patterns and operational activities, and critically evaluates subsequent law enforcement and judicial responses. The author draws upon interviews with a range of European security officials, as well as non-governmental organization employees, and a recent refugee, in order to provide a series of practical recommendations.







Threat Finance


Book Description

Criminal and terrorist organisations are increasingly turning to white collar crime such as fraud, e-crime, bribery, data and identity theft, in addition to more violent activities involving kidnap and ransom, narcotics and arms trafficking, to fund their activities and, in some cases pursue their cause. The choice of victims is global and indiscriminate. The modus operandi is continually mutating and increasing in sophistication; taking advantage of weaknesses in the system whether they be technological, legal or political. Countering these sources of threat finance is a shared challenge for governments, the military, NGOs, financial institutions and other businesses that may be targeted. Shima Keene’s Threat Finance offers new thinking to equip any organisation regardless of sector and geographical location, with the knowledge and tools to deploy effective counter measures to tackle the threat. To that end, she brings together a wide variety of perspectives - cultural, legal, economic and technological - to explain the sources, mechanisms and key intervention methodologies. The current environment continues to favour the criminal and the terrorist. Threat Finance is an essential read for fraud and security practitioners, financial regulators, policy-makers, intelligence officials, judges and barristers, law enforcement officers, and researchers in this field. Dr Keene offers an antidote to the lack of good, applied, research; shortcomings in in-house financial and forensic expertise; misdirected financial compliance schemes; legal and judicial idiosyncrasies; unhelpful organisation structures and poor communication. She argues convincingly for a coherent, aggressive, informed and cross-disciplinary approach to an ever changing and rapidly growing threat.




Encyclopedia of Criminal Activities and the Deep Web


Book Description

As society continues to rely heavily on technological tools for facilitating business, e-commerce, banking, and communication, among other applications, there has been a significant rise in criminals seeking to exploit these tools for their nefarious gain. Countries all over the world are seeing substantial increases in identity theft and cyberattacks, as well as illicit transactions, including drug trafficking and human trafficking, being made through the dark web internet. Sex offenders and murderers explore unconventional methods of finding and contacting their victims through Facebook, Instagram, popular dating sites, etc., while pedophiles rely on these channels to obtain information and photographs of children, which are shared on hidden community sites. As criminals continue to harness technological advancements that are outpacing legal and ethical standards, law enforcement and government officials are faced with the challenge of devising new and alternative strategies to identify and apprehend criminals to preserve the safety of society. The Encyclopedia of Criminal Activities and the Deep Web is a three-volume set that includes comprehensive articles covering multidisciplinary research and expert insights provided by hundreds of leading researchers from 30 countries including the United States, the United Kingdom, Australia, New Zealand, Germany, Finland, South Korea, Malaysia, and more. This comprehensive encyclopedia provides the most diverse findings and new methodologies for monitoring and regulating the use of online tools as well as hidden areas of the internet, including the deep and dark web. Highlighting a wide range of topics such as cyberbullying, online hate speech, and hacktivism, this book will offer strategies for the prediction and prevention of online criminal activity and examine methods for safeguarding internet users and their data from being tracked or stalked. Due to the techniques and extensive knowledge discussed in this publication it is an invaluable addition for academic and corporate libraries as well as a critical resource for policy makers, law enforcement officials, forensic scientists, criminologists, sociologists, victim advocates, cybersecurity analysts, lawmakers, government officials, industry professionals, academicians, researchers, and students within this field of study.




Europe's Red Terrorists


Book Description

This unique volume explores Europe's most dangerous communist terrorist organizations and reveals how they use violence as a means of political communication and persuasion. It outlines seven terrorist groups from Germany, Greece, Spain, France, Belgium, Italy and Turkey and gives their modus operandi, rationale and political messages in translated communiqués never before available in English.




The Age of Lone Wolf Terrorism


Book Description

The lethality of lone-wolf terrorism has reached an all-time high in the United States. Isolated individuals using firearms with high-capacity magazines are committing brutally efficient killings with the aim of terrorizing others, yet there is little consensus on what connects these crimes and the motivations behind them. In The Age of Lone Wolf Terrorism, terrorism experts Mark S. Hamm and Ramón Spaaij combine criminological theory with empirical and ethnographic research to map the pathways of lone-wolf radicalization, helping with the identification of suspected behaviors and recognizing patterns of indoctrination. Reviewing comprehensive data on these actors, including more than two hundred terrorist incidents, Hamm and Spaaij find that a combination of personal and political grievances lead lone wolves to befriend online sympathizers—whether jihadists, white supremacists, or other antigovernment extremists—and then announce their intent to commit terror when triggered. Hamm and Spaaij carefully distinguish between lone wolves and individuals radicalized within a group dynamic. This important difference is what makes this book such a significant manual for professionals seeking richer insight into the transformation of alienated individuals into armed warriors. Hamm and Spaaij conclude with an analysis of recent FBI sting operations designed to prevent lone-wolf terrorism in the United States, describing who gets targeted, strategies for luring suspects, and the ethics of arresting and prosecuting citizens.