Search results for: terrorist group
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8116

Search results for: terrorist group

8086 Framing the Dynamics and Functioning of Different Variants of Terrorist Organizations: A Business Model Perspective

Authors: Eisa Younes Alblooshi

Abstract:

Counterterrorism strategies, to be effective and efficient, require a sound understanding of the dynamics, the interlinked organizational elements of the terrorist outfits being combated, with a view to having cognizance of their strong points to be guarded against, as well as the vulnerable zones that can be targeted for optimal results in a timely fashion by counterterrorism agencies. A unique model regarding the organizational imperatives was evolved in this research through likening the terrorist organizations with the traditional commercial ones, with a view to understanding in detail the dynamics of interconnectivity and dependencies, and the related compulsions facing the leaderships of such outfits that provide counterterrorism agencies with opportunities for forging better strategies. It involved assessing the evolving organizational dynamics and imperatives of different types of terrorist organizations, to enable the researcher to construct a prototype model that defines the progression and linkages of the related organizational elements of such organizations. It required detailed analysis of how the various elements are connected, with sequencing identified, as any outfit positions itself with respect to its external environment and internal dynamics. A case study focusing on a transnational radical religious state-sponsored terrorist organization was conducted to validate the research findings and to further strengthen the specific counterterrorism strategies. Six different variants of the business model of terrorist organizations were identified, categorized based on their outreach, mission, and status of any state sponsorship. The variants represent vast majority of the range of terrorist organizations acting locally or globally. The model shows the progression and dynamics of these organizations through various dimensions including mission, leadership, outreach, state sponsorship status, resulting in the organizational structure, state of autonomy, preference divergence in its fold, recruitment core, propagation avenues, down to their capacity to adapt, resulting critically in their own life cycles. A major advantage of the model is the utility of mapping terrorist organizations according to their fits to the sundry identified variants, allowing for flexibility and differences within, enabling the researchers and counterterrorism agencies to observe a neat blueprint of the organization’s footprint, along with highlighting the areas to be evaluated for focused target zone selection and timing of counterterrorism interventions. Special consideration is given to the dimension of financing, keeping in context the latest developments regarding cryptocurrencies, hawala, and global anti-money laundering initiatives. Specific counterterrorism strategies and intervention points have been identified for each of the respective model variants, with a view to efficient and effective deployment of resources.

Keywords: terrorism, counterterrorism, model, strategy

Procedia PDF Downloads 129
8085 Illicit Arms and the Emergence of Armed Groups in Nigeria

Authors: Halilu Babaji, Adamu Buba

Abstract:

Illicit arms and the emergence of armed groups have witnessed unprecedented situations of political uncertainties in Nigeria, and the twenty-first century globalisation has established the process that has benefited a good number of militia groups and thereby boosting both illicit arms movement and the thriving of terrorist groups, which are largely responsible for the longstanding threat to the national security and stability of the country. This has unleashed unforeseen consequences on the entire Sub-region, following an inflow of weapons and armed fighter which are motivated by weak governance, insecurity and poverty. The social, economic and political environments make it a fertile breeding ground for the penetration and development of terrorist groups in Sub-Saharan Africa.

Keywords: arms, emergence, insecurity, groups

Procedia PDF Downloads 229
8084 Re-Emergence of Religious Militancy in Pakistan after Return of Afghan Taliban to Power Corridors in Afghanistan (2021-2022)

Authors: Syed Sibtain Hussain Shah

Abstract:

The Afghan Taliban returned to power corridors in Afghanistan in August 2021 after waging a twenty-year insurgency in the country. U.S.-led forces completed their withdrawal from Afghanistan on August 30, 2021, but the Taliban took control of the whole country till August 15, 2021. At the same time, some of the militant groups such as Tehrik-e-Taliban Pakistan (TTP) and Islamic State Khurasan (IS-K) reappeared in Pakistan’s borders and other areas and by increasing attacks on the armed forces of Pakistan and minorities communities. These groups once again created a crucial challenge to the internal security of the country. Since mid of 2021, many of the terrorist incidents in the countries specified in the areas of Pakistan bordering Afghanistan were committed by TTP and IS-K. The aim of this paper is to investigate the reappearance of TTP and IS-K in 2021 and 2022 as a crucial threat to the internal security of Pakistan. The author will particularly probe threats to the security of military personnel and their installations and threats to human security, including danger to religious minority communities in the different areas of the country, including border areas such as Waziristan, which was once a hub of TTP and other militant groups in the 2000s. The author will employ the relevant method and appropriate theories of security studies, such as religious extremism and terrorism, in this study. TTP, inspired by the Afghan Taliban, initially emerged in Pakistan in 2007 and this group has so far targeted various religious and ethnic communities and government installations in Pakistan. The group is not only against Pakistan’s government policies, but it also committed terrorist attacks on the communities of the other Muslim sects and as well as non-Muslim communities. Most of the prominent figures of this violent group disappeared or escaped to Afghanistan after military actions, such as the larger “Zarb-e-Azb” operation in Pakistan in 2015. IS-K, which established its branch of Khurasan covering Pakistan and Afghanistan in 2015, with its main formation in Iraq and Syria in 2015, by targeting religious minorities such as Shia Muslims, has so far created a vital security challenge for the security of the country.

Keywords: Pakistan, Afghanistan, Afghan Taliban, Pakistani Taliban, Islamic state Khorasan, security threat

Procedia PDF Downloads 107
8083 Exploring the Profiles of Militants in the SWAT Valley of Pakistan

Authors: Lateef Hakim Zai Khyber, Syed Rashid Ali

Abstract:

In the post 9/11 era, a new trend has developed of terrorist profiling on the basis of the ethnic, religious, political, psychological, social, and economic background of the terrorists to anticipate and assess the possible risk and to prevent and prosecute the suspected before they commit any violent act. The same profiling approach was adopted in different militant or terrorist de-radicalization and rehabilitation programs across the world in order to evaluate and identify the reasons and causes for joining terrorism in terms of push and pull factors. This paper attempts to explore and investigate the profiles of the detainees in the Sabaoon de-radicalization and Emancipation program, which aimed at de-radicalizing the former militants of Tehrik-e-Taliban (TTP) Pakistan in the Swat valley of Pakistan. This research attempted to use qualitative methods for collecting data, including a number of formal and informal open-ended interviews with the former staff members of Sabaoon to explore various aspects of the program, such as various approaches used at Sabaoon for terrorist profiling. It conducts a thorough examination of the profiles of the terrorist through their socioeconomic, ideological, emotional, intellectual, and psychological conditions and orientations, personal details, family issues, social preferences, etc. The study finds out that the majority of the terrorists belonged to the marginalized groups or lower class, including underprivileged tenants and poor laborers, of society having no access to land. They possess almost the same profiles, including low socioeconomic status, absence of a father or strict behavior of parents, large and combined families, lack of education, lack of religious understanding, etc. They also possess some common traits such as anxiety disorder, emotional instability, aggressive impulses and insecurity, depression, inferiority complex, lack of critical thinking and logical reasoning, authority-seeking behavior, and revenge-seeking behavior.

Keywords: terrorist profiling, Sabaoon, de-radicalization, rehabilitation, Swat, Pakistan, juvenile militants

Procedia PDF Downloads 130
8082 Politics of Violence and Terrorism in the Nigeria Democracy and Its Implications on National Peace and Security

Authors: Felix O. Akinboyewa

Abstract:

To say that Nigeria is faced with the problem of domestic terrorism is to say the obvious. The spate of political assassination during the fourth republic (1999-2010) is representative of what has become a growing trend. In this research, an attempt was made to examine the problems of political assassination within the context of significant categories of domestic-related terrorism in Nigeria Democracy. The central questions are: What exactly are the nature of political violence and terrorist act in the Nigeria nascent democracy? Was there any factor responsible for the politics of violence and terrorist act in the Nigeria democracy? What implications can the political violence and terrorist act have on democratic consolidation, national peace, and security? What solutions can be proffered to eradicate terrorist act and political violence in the Nigeria democracy? The study adopted a descriptive survey design which falls within the empirical research methodology. The sample size of the study consisted of 220 subjects randomly selected. The main instruments used were questionnaire and interview schedule. Data generated from the study were analyzed using descriptive statistics such as percentage and tables. The research findings showed that unemployed youths and the members of Nigeria Union of Road Transport Workers (NURTW) were the major actors in political violence in Nigeria. They have access to weapons and ammunitions which they use to terrorize the populace. The research showed that factors responsible for the political violence and terrorism in Nigeria are: poor electoral administration; election rigging; poor security system; religious and ethnic sentiment; problems of poverty and unemployment; over-exuberance and low level of education. The study also showed that electoral violence affects smooth running democracy in Nigeria. On the measures to be taken to eradicate political violence and terrorism in Nigeria, the research showed that provision of employment opportunities would go a long way to solving the problem. Civil society as an important institution can help to reduce incidence of political violence in Nigeria. Also, government has greater role to play. The study concludes that adherence to the proffered suggestions would reduce the level of political violence and terrorist act in Nigeria.

Keywords: consolidation, democracy, peace, security, terrorism, violence

Procedia PDF Downloads 96
8081 Policy and Strategy to Combatting Terrorism in Indonesia: Analysis Socio Juridical Counter and Contra Terrorism

Authors: Dini Dewi Heniarti

Abstract:

In the past decades, Indonesia has suffered severe terrorist attacks, faced major terrorism challenges and has made impressive progress in countering it. The trend of terrorist groups operating in Indonesia is to focus on ‘soft’ targets. Indonesia has made notable progress in strengthening the legal regime against terrorism, in conformity with the international treaties against terrorism. Further measures are however needed to complete the legal regime building processes. This paper will demonstrate analyze socio yuridical contra and counter terrorism by Indonesia Government.

Keywords: policy, strategy, combatting terrorism, socio juridical, counter and contra terrorism

Procedia PDF Downloads 397
8080 Social Media as a Source of Radicalization; A Case Study of Pakistan

Authors: Manam Hanfi

Abstract:

Pakistan is a victim of terrorism since 9/11 attacks. Since then it is a home for violence and extremism. One of the major reasons behind rising violence and extremism in Pakistan is radicalization. Pakistan has seen and suffered from the modification of terrorism from old to new. In new terrorism, the terrorist organizations incorporated internet to disseminate propaganda, to recruit and train people. The study focuses on the relationship between Pakistan and new terrorism and examines how the internet is being used by terrorist organizations. The study investigates radicalization through social media by terrorist organizations in Pakistan with the help of case studies. The study suggests five ways to counter radicalization, including, counter narrative on social media, content analysis of the data on the internet, curriculum and madrassa reforms, teaching peace education in the educational institutions and use of technical software such as eGLYPH to quickly remove violent data from social media. Lastly, the research attempted to contribute in counter-radicalization by combining the media dependency model and ideas for counter-radicalization. The dependency model elaborates the impact of mass media content on the audience. If media dependency is high, it will cause cognitive, affective and behavioral changes. In order to counter radicalization through social media, it is important to make cognitive, affective and behavioral changes with the help of counter-radicalization suggestions.

Keywords: counter radicalization, extremism, social media, terrorism

Procedia PDF Downloads 128
8079 US-ASEAN Counter Terrorism Cooperation: Maintaining International Security and Avoiding Muslim Stereotypes

Authors: Jordan Daud, Satriya Wibawa, Wahyu Wardhana

Abstract:

The US Global War on Terror has had effect on Southeast Asia as Second Front of Global War on Terror. Since 2001, ASEAN had adopted legal framework to counter the terrorist threat through numerous approach which accommodate various counterterrorism policy of the ten member states. ASEAN have also enhanced multilateral cooperation with US and its allies in Asia Pacific region in addressing terrorist threat, terrorist funding, cyber terrorism and other forms of terrorism. This cooperation is essential to maintain international security and stability and also assure economic development. This work focuses on the US-ASEAN counterterrorism cooperation due to they identified terrorism as a mutual enemy that posed to human security, infrastructure security, and national security. Having in mind that international terrorism usually connected with Muslim community, this paper will also elaborate the concept of Jihad and Islam revivalism in politics to avoid negative image of Islam and Muslim. This paper argues that as region with large Muslim community, Southeast Asia still need to tighten counter terrorism cooperation and also lessening Muslim stereotypes with terrorism through educating public understanding and inter-faith and intra-faith dialogue to create a better world.

Keywords: ASEAN, U.S., counter terrorism, Muslim stereotypes

Procedia PDF Downloads 222
8078 4P-Model of Information Terrorism

Authors: Nataliya Venelinova

Abstract:

The paper proposes a new interdisciplinary model of reconsidering the role of mass communication effects by coverage of terrorism. The idea of 4P model is based on the synergy, created by the information strategy of threat, predominantly used by terrorist groups, the effects of mediating the symbolic action of the terrorist attacks or the taking of responsibility of any attacks, and the reshaped public perception for security after the attacks being mass communicated. The paper defines the mass communication cycle of terrorism, which leads not only to re-agenda setting of the societies, but also spirally amplifying the effect of propagating fears by over-informing on terrorism attacks. This finally results in the outlining of the so called 4P-model of information terrorism: mass propaganda, panic, paranoia and pandemic.

Keywords: information terrorism, mass communication cycle, public perception, security

Procedia PDF Downloads 141
8077 American Criminal Justice Responses to Terrorism in the Post 9/11 Era

Authors: Summer Jackson

Abstract:

September 11, 2001 terrorist attacks exposed weaknesses in federal law enforcement’s ability to proactively counter threats to American homeland security. Following the attacks, legislative reforms and policy changes cleared both bureaucratic and legal obstacles to anti-terrorism efforts. The Federal Bureau of Investigation (FBI) transformed into a domestic intelligence agency responsible for preventing future terrorist attacks. Likewise, the passage of the 2001 USA Patriot Act gave federal agents new discretionary powers to more easily collect intelligence on those suspected of supporting terrorism. Despite these changes, there has been only limited scholarly attention paid to terrorism responses by the federal criminal justice system. This study sought to examine the investigative and prosecutorial changes made in the Post-9/11 era. The methodology employed bivariate and multivariate statistics using data from the American Terrorism Study (ATS). This analysis examined how policy changes are reflected in the nature of terrorism investigations, the handling of terrorist defendants by federal prosecutors, and the outcomes of terrorism cases since 2001. The findings indicate significant investigative and prosecutorial changes in the Post-9/11 era. Specifically, this study found terrorism cases involved younger defendants, fewer indictees per case, less use of human intelligence, less complicated attacks, less serious charges, and more plea bargains. Overall, this study highlights the important shifts in responses to terrorism following the 9/11 attacks.

Keywords: terrorism, law enforcement, post-9/11, federal policy

Procedia PDF Downloads 94
8076 Political Coercion from Within: Theoretical Convergence in the Strategies of Terrorist Groups, Insurgencies, and Social Movements

Authors: John Hardy

Abstract:

The early twenty-first century national security environment has been characterized by political coercion. Despite an abundance of political commentary on the various forms of non-state coercion leveraged against the state, there is a lack of literature which distinguishes between the mechanisms and the mediums of coercion. Frequently non-state movements seeking to coerce the state are labelled by their tactics, not their strategies. Terrorists, insurgencies and social movements are largely defined by the ways in which they seek to influence the state, rather than by their political aims. This study examines the strategies of coercion used by non-state actors against states. This approach includes terrorist groups, insurgencies, and social movements who seek to coerce state politics. Not all non-state actors seek political coercion, so not all examples of different group types are considered. This approach also excludes political coercion by states, focusing on the non-state actor as the primary unit of analysis. The study applies a general theory of political coercion, which is defined as attempts to change the policies or action of a polity against its will, to the strategies employed by terrorist groups, insurgencies, and social movements. This distinguishes non-state actors’ strategic objectives from their actions and motives, which are variables that are often used to differentiate between types of non-state actors and the labels commonly used to describe them. It also allows for a comparative analysis of theoretical perspectives from the disciplines of terrorism, insurgency and counterinsurgency, and social movements. The study finds that there is a significant degree of overlap in the way that different disciplines conceptualize the mechanism of political coercion by non-state actors. Studies of terrorism and counterterrorism focus more on the notions of cost tolerance and collective punishment, while studies of insurgency focus on a contest of legitimacy between actors, and social movement theory tend to link political objectives, social capital, and a mechanism of influence to leverage against the state. Each discipline has a particular vernacular for the mechanism of coercion, which is often linked to the means of coercion, but they converge on three core theoretical components of compelling a polity to change its policies or actions: exceeding resistance to change, using political or violent punishments, and withholding legitimacy or consent from a government.

Keywords: counter terrorism, homeland security, insurgency, political coercion, social movement theory, terrorism

Procedia PDF Downloads 149
8075 A Social Decision Support Mechanism for Group Purchasing

Authors: Lien-Fa Lin, Yung-Ming Li, Fu-Shun Hsieh

Abstract:

With the advancement of information technology and development of group commerce, people have obviously changed in their lifestyle. However, group commerce faces some challenging problems. The products or services provided by vendors do not satisfactorily reflect customers’ opinions, so that the sale and revenue of group commerce gradually become lower. On the other hand, the process for a formed customer group to reach group-purchasing consensus is time-consuming and the final decision is not the best choice for each group members. In this paper, we design a social decision support mechanism, by using group discussion message to recommend suitable options for group members and we consider social influence and personal preference to generate option ranking list. The proposed mechanism can enhance the group purchasing decision making efficiently and effectively and venders can provide group products or services according to the group option ranking list.

Keywords: social network, group decision, text mining, group commerce

Procedia PDF Downloads 460
8074 Clash of Civilizations without Civilizational Groups: Revisiting Samuel P. Huntington's Clash of Civilizations Theory

Authors: Jamal Abdi

Abstract:

This paper offers a critique of Samuel P. Huntington's Clash of Civilizations thesis. The overriding argument is that Huntington's thesis is characterized by failure to distinguish between 'groups' and 'categories'. Multinational civilizations overcoming their internal collective action problems, which would enable them to pursue a unified strategy vis-à-vis the West, is a rather foundational assumption in his theory. Without assigning sufficient intellectual attention to the processes through which multinational civilizations may gain the capacity for concerted action, i.e., become a group, he contended that the post-cold-war world would be shaped in large measure by interactions among seven or eight major civilizations. Thus, failure in providing a convincing analysis of multi-national civilizations' transition from categories to groups is a significant weakness in Huntington's clash theory. It is also suggested that so-called Islamic terrorism and the war on terror is not to be taken as an expression of the presence of clash between a Western and an Islamic civilization, as terrorist organizations would be superfluous in a world characterized by clash of civilizations. Consequences of multinational civilizations becoming a group are discussed in relation to contemporary Western superiority.

Keywords: clash of civilizations, groups, categories, groupism

Procedia PDF Downloads 167
8073 Limiting Freedom of Expression to Fight Radicalization: The 'Silencing' of Terrorists Does Not Always Allow Rights to 'Speak Loudly'

Authors: Arianna Vedaschi

Abstract:

This paper addresses the relationship between freedom of expression, national security and radicalization. Is it still possible to talk about a balance between the first two elements? Or, due to the intrusion of the third, is it more appropriate to consider freedom of expression as “permanently disfigured” by securitarian concerns? In this study, both the legislative and the judicial level are taken into account and the comparative method is employed in order to provide the reader with a complete framework of relevant issues and a workable set of solutions. The analysis moves from the finding according to which the tension between free speech and national security has become a major issue in democratic countries, whose very essence is continuously endangered by the ever-changing and multi-faceted threat of international terrorism. In particular, a change in terrorist groups’ recruiting pattern, attracting more and more people by way of a cutting-edge communicative strategy, often employing sophisticated technology as a radicalization tool, has called on law-makers to modify their approach to dangerous speech. While traditional constitutional and criminal law used to punish speech only if it explicitly and directly incited the commission of a criminal action (“cause-effect” model), so-called glorification offences – punishing mere ideological support for terrorism, often on the web – are becoming commonplace in the comparative scenario. Although this is direct, and even somehow understandable, consequence of the impending terrorist menace, this research shows many problematic issues connected to such a preventive approach. First, from a predominantly theoretical point of view, this trend negatively impacts on the already blurred line between permissible and prohibited speech. Second, from a pragmatic point of view, such legislative tools are not always suitable to keep up with ongoing developments of both terrorist groups and their use of technology. In other words, there is a risk that such measures become outdated even before their application. Indeed, it seems hard to still talk about a proper balance: what was previously clearly perceived as a balancing of values (freedom of speech v. public security) has turned, in many cases, into a hierarchy with security at its apex. In light of these findings, this paper concludes that such a complex issue would perhaps be better dealt with through a combination of policies: not only criminalizing ‘terrorist speech,’ which should be relegated to a last resort tool, but acting at an even earlier stage, i.e., trying to prevent dangerous speech itself. This might be done by promoting social cohesion and the inclusion of minorities, so as to reduce the probability of people considering terrorist groups as a “viable option” to deal with the lack of identification within their social contexts.

Keywords: radicalization, free speech, international terrorism, national security

Procedia PDF Downloads 176
8072 Deradicalization for Former Terrorists through Entrepreneurship Program

Authors: Jamal Wiwoho, Pujiyono, Triyanto

Abstract:

Terrorism is a real enemy for all countries, including Indonesia. Bomb attacks in some parts of Indonesia are proof that Indonesia has serious problems with terrorism. Perpetrators of terror are arrested and imprisoned, and some of them were executed. However, this method did not succeed in stopping the terrorist attacks. Former terrorists continue to carry out bomb attacks. Therefore, this paper proposes a program towards deradicalization efforts of former terrorists through entrepreneurship. This is necessary because it is impossible to change their radical ideology. The program is also motivated by understanding that terrorists generally come from poor families. This program aims to occupy their time with business activities so there is no time to plan and carry out bomb attacks. This research is an empirical law study. Data were collected by literature study, observation, and in-depth interviews. Data were analyzed with the Miles and Huberman interactive model. The results show that the entrepreneurship program is effective to prevent terrorist attack. Former terrorists are busy with their business. Therefore, they have no time to carry out bomb attacks.

Keywords: deradicalization, terrorism, terrorists, entrepreneurship

Procedia PDF Downloads 240
8071 Disability, Stigma and In-Group Identification: An Exploration across Different Disability Subgroups

Authors: Sharmila Rathee

Abstract:

Individuals with disability/ies often face negative attitudes, discrimination, exclusion, and inequality of treatment due to stigmatization and stigmatized treatment. While a significant number of studies in field of stigma suggest that group-identification has positive consequences for stigmatized individuals, ironically very miniscule empirical work in sight has attempted to investigate in-group identification as a coping measure against stigma, humiliation and related experiences among disability group. In view of death of empirical research on in-group identification among disability group, through present work, an attempt has been made to examine the experiences of stigma, humiliation, and in-group identification among disability group. Results of the study suggest that use of in-group identification as a coping strategy is not uniform across members of disability group and degree of in-group identification differs across different sub-groups of disability groups. Further, in-group identification among members of disability group depends on variables like degree and impact of disability, factors like onset of disability, nature, and visibility of disability, educational experiences and resources available to deal with disabling conditions.

Keywords: disability, stigma, in-group identification, social identity

Procedia PDF Downloads 287
8070 Evolution of Bombings against Transportation Infrastructure

Authors: Jonathan K. Hill

Abstract:

The transportation networks throughout Africa remain the only transportation infrastructure system in the world that is attacked by terrorists at a high frequency, so the international community can learn from each attack. The targeting of transportation should be recognized as a direct attack against a civilian population, so the international community should work to better understand the types of attacks utilized, the types of improvised explosive device designs adapted to transportation targets, and the ways the various modes of transportation have been attacked throughout the continent. Some countries have seen grenade attacks that have resulted in only injuries, while some countries have experienced large vehicle bombings that have resulted in hundreds of injuries and numerous deaths. With insurgencies, explosive devices have been small, complex, and generally target an enemy of the insurgency. With terrorist bombings, the explosive devices have been large, brazen, and targeted at civilian populations. And, these civilian populations are easily targeted within the transportation system. The presentation provided by Assess Africa LLC is titled ‘Evolution of Bombings Against Transportation Infrastructure’ and covers improvised explosive device characteristics, how improvised explosive devices have been adapted to transportation targets in Africa, analyses recent incidents, and provides some advice for effective protective measures. A main component of the improvised explosive device characteristics portion of the presentation focuses on the link between explosive device components, the intelligence network, and the bomb-builder’s network. By understanding the components, how the use of various components can be linked to a terrorist group’s capabilities, and how the bomb-builder acquires materials, the analysis of improvised explosive device attacks takes on a new direction – one that focuses on defeating the network instead of merely reviewing incidents of the past.

Keywords: Africa, bombings, critical infrastructure protection, transportation security

Procedia PDF Downloads 390
8069 Clash of Civilizations without Civilizational Groups: Revisiting Samuel P. Huntington´s Clash of Civilizations Theory

Authors: Jamal Abdi

Abstract:

This paper is largely a response/critique of Samuel P. Huntington´s Clash of Civilizations thesis. The overriding argument is that Huntington´s thesis is characterized by failure to distinguish between ´groups´ and ´categories´. Multinational civilizations overcoming their internal collective action problems, which would enable them to pursue a unified strategy vis-à-vis the West, is a rather foundational assumption in his theory. Without assigning sufficient intellectual attention to the processes through which multinational civilizations may gain capacity for concerted action i.e. become a group, he contended that the post-cold-war world would be shaped in large measure by interactions among seven or eight major civilizations. Thus, failure in providing a convincing analysis of multi-national civilizations´ transition from categories to groups is a significant weakness in Huntington´s clash theory. It is also suggested that so-called Islamic terrorism and the war on terror is not to be taken as an expression of presence of clash between a Western and an Islamic civilization, as terrorist organizations would be superfluous in a world characterized by clash of civilizations. Consequences of multinational civilizations becoming a group are discussed in relation to contemporary Western superiority.

Keywords: categories, civilizations, clash, groups, groupness

Procedia PDF Downloads 146
8068 The International Fight against the Financing of Terrorism: Analysis of the Anti-Money Laundering and Combating Financing of Terrorism Regime

Authors: Loukou Amoin Marie Djedri

Abstract:

Financing is important for all terrorists – from the largest organizations in control of territories, to the smallest groups – not only for spreading fear through attacks, but also to finance the expansion of terrorist dogmas. These organizations pose serious threats to the international community. The disruption of terrorist financing aims to create a hostile environment for the growth of terrorism and to limit considerably the terrorist groups capacities. The World Bank (WB), together with the International Monetary Fund (IMF), decided to include in their scope the Fight against the money laundering and the financing of terrorism, in order to assist Member States in protecting their internal financial system from terrorism use and abuse and reinforcing their legal system. To do so, they have adopted the Anti-Money Laundering /Combating Financing of Terrorism (AML/CFT) standards that have been set up by the Financial Action Task Force. This set of standards, recognized as the international standards for anti-money laundering and combating the financing of terrorism, has to be implemented by States Members in order to strengthen their judicial system and relevant national institutions. However, we noted that, to date, some States Members still have significant AML/CFT deficiencies, which can constitute serious threats not only to the country’s economic stability but also for the global financial system. In addition, studies stressed out that repressive measures are more implemented by countries than preventive measures, which could be an important weakness in a state security system. Furthermore, we noticed that the AML/CFT standards evolve slowly, while techniques used by terrorist networks keep developing. The goal of the study is to show how to enhance the AML/CFT global compliance through the work of the IMF and the WB, to help member states to consolidate their financial system. To encourage and ensure the effectiveness of these standards, a methodology for assessing the compliance with the AML/CFT standards has been created to follow up the concrete implementation of these standards and to provide accurate technical assistance to countries in need. A risk-based approach has also been adopted as a key component of the implementation of the AML/CFT Standards, with the aim of strengthening the efficiency of the standards. Instead, we noted that the assessment is not efficient in the process of enhancing AML/CFT measures because it seems to lack of adaptation to the country situation. In other words, internal and external factors are not enough taken into account in a country assessment program. The purpose of this paper is to analyze the AML/CFT regime in the fight against the financing of terrorism and to find lasting solutions to achieve the global AML/CFT compliance. The work of all the organizations involved in this combat is imperative to protect the financial network and to lead to the disintegration of terrorist groups in the future.

Keywords: AML/CFT standards, financing of terrorism, international financial institutions, risk-based approach

Procedia PDF Downloads 254
8067 Analyzing Environmental Emotive Triggers in Terrorist Propaganda

Authors: Travis Morris

Abstract:

The purpose of this study is to measure the intersection of environmental security entities in terrorist propaganda. To the best of author’s knowledge, this is the first study of its kind to examine this intersection within terrorist propaganda. Rosoka, natural language processing software and frame analysis are used to advance our understanding of how environmental frames function as emotive triggers. Violent jihadi demagogues use frames to suggest violent and non-violent solutions to their grievances. Emotive triggers are framed in a way to leverage individual and collective attitudes in psychological warfare. A comparative research design is used because of the differences and similarities that exist between two variants of violent jihadi propaganda that target western audiences. Analysis is based on salience and network text analysis, which generates violent jihadi semantic networks. Findings indicate that environmental frames are used as emotive triggers across both data sets, but also as tactical and information data points. A significant finding is that certain core environmental emotive triggers like “water,” “soil,” and “trees” are significantly salient at the aggregate level across both data sets. All environmental entities can be classified into two categories, symbolic and literal. Importantly, this research illustrates how demagogues use environmental emotive triggers in cyber space from a subcultural perspective to mobilize target audiences to their ideology and praxis. Understanding the anatomy of propaganda construction is necessary in order to generate effective counter narratives in information operations. This research advances an additional method to inform practitioners and policy makers of how environmental security and propaganda intersect.

Keywords: propaganda analysis, emotive triggers environmental security, frames

Procedia PDF Downloads 114
8066 Islam, Tolerance and Anti-Terrorism: A Critical Assessment with Reference to the Royal 'Amman Message'

Authors: Adnan M. Al Assaf

Abstract:

This research project aims to assess the methods of enhancing tolerant thinking and behavior among Muslim societies. This is in addition to spreading the anti-terrorist approach in their communities. The critical assessment for the Islamic major texts in question is the selected way for convincing, as Muslims adopt these sources as the authentic references for their lives and cultures. Moreover, this research devotes a special room to the analysis of the royal ‘Amman Message’ as a contemporary Islamic approach for enhancing tolerance and anti-terrorism from an Islamic perspective. The paper includes the study of the related concepts, texts, practical applications, with some reference to the history of Islam in human interaction, accepting the others, mercy with minorities, protecting human rights. Furthermore, it assesses the methods of enhancing tolerance and minimizing the terrorist thinking and behavior practically, in the view of Amman message, as well.

Keywords: Islam, tolerance, anti-terrorism, coexistence, Amman Message

Procedia PDF Downloads 432
8065 A Weighted Group EI Incorporating Role Information for More Representative Group EI Measurement

Authors: Siyu Wang, Anthony Ward

Abstract:

Emotional intelligence (EI) is a well-established personal characteristic. It has been viewed as a critical factor which can influence an individual's academic achievement, ability to work and potential to succeed. When working in a group, EI is fundamentally connected to the group members' interaction and ability to work as a team. The ability of a group member to intelligently perceive and understand own emotions (Intrapersonal EI), to intelligently perceive and understand other members' emotions (Interpersonal EI), and to intelligently perceive and understand emotions between different groups (Cross-boundary EI) can be considered as Group emotional intelligence (Group EI). In this research, a more representative Group EI measurement approach, which incorporates the information of the composition of a group and an individual’s role in that group, is proposed. To demonstrate the claim of being more representative Group EI measurement approach, this study adopts a multi-method research design, involving a combination of both qualitative and quantitative techniques to establish a metric of Group EI. From the results, it can be concluded that by introducing the weight coefficient of each group member on group work into the measurement of Group EI, Group EI will be more representative and more capable of understanding what happens during teamwork than previous approaches.

Keywords: case study, emotional intelligence, group EI, multi-method research

Procedia PDF Downloads 102
8064 Manipulation of the Public Sphere to Win Cultural Hegemony: The Process by Which Islamic State Uses the Principles of the Overton Window to Engineer Extremism

Authors: A. Brigitte Coles

Abstract:

In order to be successful in a campaign against terror and maintain a favorable world order, we must recognize the effects of priming, framing, and agenda setting on the public sphere, and address how terrorist organizations are able to manipulate language and symbols to shift public opinion and increase recruitment success. Because of their unprecedented activity in the region and foreign recruitment success, this study specifically addresses how the Islamic State (IS/ISIS/ISIL) manipulates the public sphere to amplify support and increase western recruitment. By following a grounded theory methodology and coding triangulated data from IS propaganda, a model for the process of terrorist recruitment has emerged, concerning both environments and personalities susceptible to recruitment, and the steps by which an extremist can be created. This has resulted in the ability to reverse engineer a method by which counter recruitment operations can be facilitated in an effort to lessen the vulnerability of areas and individuals, as well as create dissent among current extremists.

Keywords: countering violent extremism, counter-terrorism, recruitment, overton window

Procedia PDF Downloads 307
8063 The Control Illusion of Conditioned Superstition

Authors: Chia-Ching Tsai

Abstract:

The study examined the control illusion of conditioned superstition by using Taiwanese subjects. The study had a three-group experimental design, that is, conditioning group and a control group, and the conditioning group was further separated into superstitious and unsuperstitious groups. The results showed that conditioned superstition can significantly influence the control illusion. Further analysis showed that the control illusion in the superstitious conditioning group was significantly greater than in the control group or in the unsuperstitious conditioning group. Besides, there was no significant difference between the control group and the unsuperstitious conditioning group.

Keywords: Control illusion, Conditioned superstition, experimental design

Procedia PDF Downloads 582
8062 How Restorative Justice Can Inform and Assist the Provision of Effective Remedies to Hate Crime, Case Study: The Christchurch Terrorist Attack

Authors: Daniel O. Kleinsman

Abstract:

The 2019 terrorist attack on two masjidain in Christchurch, New Zealand, was a shocking demonstration of the harm that can be caused by hate crime. As legal and governmental responses to the attack struggle to provide effective remedies to its victims, restorative justice has emerged as a tool that can assist, in terms of both meeting victims’ needs and discharging the obligations of the state under the International Covenant on Civil and Political Rights (ICCPR), arts 2(3), 26, 27. Restorative justice is a model that emphasizes the repair of harm caused or revealed by unjust behavior. It also prioritises the facilitation of dialogue, the restoration of equitable relationships, and the prevention of future harm. Returning to the case study, in the remarks of the sentencing judge, the terrorist’s actions were described as a hate crime of vicious malevolence that the Court was required to decisively reject, as anathema to the values of acceptance, tolerance and mutual respect upon which New Zealand’s inclusive society is based and which the country strives to maintain. This was one of the reasons for which the terrorist received a life sentence with no possibility of parole. However, in the report of the Royal Commission of Inquiry into the Attack, it was found that victims felt the attack occurred within the context of widespread racism, discrimination and Islamophobia, where hostile behaviors, including hate-based threats and attacks, were rarely recorded, analysed or acted on. It was also found that the Government had inappropriately concentrated intelligence resources on the risk of ‘Islamist’ terrorism and had failed to adequately respond to concerns raised about threats against the Muslim community. In this light, the remarks of the sentencing judge can be seen to reflect a criminal justice system that, in the absence of other remedies, denies systemic accountability and renders hate crime an isolated incident rather than an expression of more widespread discrimination and hate to be holistically addressed. One of the recommendations of the Royal Commission was to explore with victims the desirability and design of restorative justice processes. This presents an opportunity for victims to meet with state representatives and pursue effective remedies (ICCPR art 2(3)) not only for the harm caused by the terrorist but the harm revealed by a system that has exposed the minority Muslim community in New Zealand to hate in all forms, including but not limited to violent extremism. In this sense, restorative justice can also assist the state in discharging its wider obligations to protect all persons from discrimination (art 26) and allow ethnic and religious minorities to enjoy their own culture and profess and practice their own religion (art 27). It can also help give effect to the law and its purpose as a remedy to hate crime, as expressed in this case study by the sentencing judge.

Keywords: hate crime, restorative justice, minorities, victims' rights

Procedia PDF Downloads 80
8061 Secure Distance Bounding Protocol on Ultra-WideBand Based Mapping Code

Authors: Jamel Miri, Bechir Nsiri, Ridha Bouallegue

Abstract:

Ultra WidBand-IR physical layer technology has seen a great development during the last decade which makes it a promising candidate for short range wireless communications, as they bring considerable benefits in terms of connectivity and mobility. However, like all wireless communication they suffer from vulnerabilities in terms of security because of the open nature of the radio channel. To face these attacks, distance bounding protocols are the most popular counter measures. In this paper, we presented a protocol based on distance bounding to thread the most popular attacks: Distance Fraud, Mafia Fraud and Terrorist fraud. In our work, we study the way to adapt the best secure distance bounding protocols to mapping code of ultra-wideband (TH-UWB) radios. Indeed, to ameliorate the performances of the protocol in terms of security communication in TH-UWB, we combine the modified protocol to ultra-wideband impulse radio technology (IR-UWB). The security and the different merits of the protocols are analyzed.

Keywords: distance bounding, mapping code ultrawideband, terrorist fraud, physical layer technology

Procedia PDF Downloads 263
8060 Effects of Different Dietary Crude Fiber Levels on the Growth Performance of Finishing Su-Shan Pigs

Authors: Li Bixia, Ren Shouwen, Fu Yanfeng, Tu Feng, Xiaoming Fang, Xueming Wang

Abstract:

The utilization of dietary crude fiber in different breed pigs is not the same. Su-shan pigs are a new breed formed by crossing Taihu pigs and Yorkshire pigs. In order to understand the resistance of Su-shan pigs to dietary crude fiber, 150 Su-shan pigs with 60 kg of average body weight and similar body conditions were allocated to three groups randomly, and there are 50 pigs in each group. The percentages of dietary crude fiber were 8.35%, 9.10%, and 11.39%, respectively. At the end of the experiment, 15 pigs randomly selected from each group were slaughtered. The results showed as follows: average daily gain of the 9.10% group was higher than that of the 8.35% group and the 11.39% group; there was a significant difference between the 9.10% group and the 8.35% group (p < 0.05. Levels of urea nitrogen, total cholesterol and high density lipoprotein in the 9.10% group were significantly higher than those in the 8.35% group and the 11.39% group (p < 0.05). Ratios of meat to fat in the 9.10% group and the 11.39% group were significantly higher than that in the 8.35% group (p < 0.05). Lean percentage of 9.10% group was higher than that of 8.35% group and 11.39% group, but there was no significant difference in three groups (p > 0.05). The weight of small intestine and large intestine in the 11.39% group was higher than that in the 8.35% group, and the 9.10% group and the difference reached a significant level (p < 0.05). In conclusion, increasing dietary crude fiber properly could reduce fat percentage, and improve the ratio of meat to fat of finishing Su-shan pigs. The digestion and metabolism of dietary crude fiber promoted the development of stomach and intestine of finishing Su-shan pig.

Keywords: Su-shan pigs, dietary crude fiber, growth performance, serum biochemical indexes

Procedia PDF Downloads 286
8059 ISIS Women Recruitment in Spain and De-Radicalization Programs in Prisons

Authors: Inmaculada Yuste Martinez

Abstract:

Since July 5, 2014, Abubaker al Bagdadi, leader of the Islamic State since 2010 climbed the pulpit of the Great Mosque of Al Nuri of Mosul and proclaimed the Caliphate, the number of fighters who have travelled to Syria to join the Caliphate has increased as never before. Although it is true that the phenomenon of foreign fighters is not a new phenomenon, as it occurred after the Spanish Civil War, Republicans from Ireland and the conflict of the Balkans among others, it is highly relevant the fact that in this case, it has reached figures unknown in Europe until now. The approval of the resolution 2178 (2014) of the Security Council, foreign terrorist fighters placed the subject a priority position on the International agenda. The available data allow us to affirm that women have increasingly assumed operative functions in jihadist terrorism and in the activities linked to it in the development of attacks in the European Union, including minors and young adults. In the case of Spain, one in four of the detainees in 2016 were women, a significant increase compared to 2015. This contrasts with the fact that until 2014 no woman had been prosecuted in Spain for terrorist activities of a jihadist nature. It is fundamental when we talk about the prevention of radicalization and counterterrorism that we do not underestimate the potential threat to the security of countries like Spain that women from the West can assume to the global jihadist movement. This work aims to deepen the radicalization processes of these women and their profiles influencing the female inmate population. It also wants to focus on the importance of creating de-radicalization programs for these inmates since women are a crucial element in radicalization processes. A special focus it is made on young radicalized female inmate population as this target group is the most recoverable and on which it would result more fruitful to intervene. De-radicalization programs must also be designed to fit their profiles and circumstances; a sensitive environment will be prisons and juvenile centers, areas that until now had been unrelated to this problem and which are already hosting the first convicted in judicial offices in Spanish territory. A qualitative research and an empirical and analytical method has been implemented in this work, focused on the cases that took place in Spain of young women and the imaginary that the Islamic State uses for the processes of radicalization for this target group and how it does not fit with their real role in the Jihad, as opposed to other movements in which women do have a real and active role in the armed conflict as YPJ do it as a part of the armed wing of the Democratic Union Party of Syria.

Keywords: caliphate, de-radicalization, foreign fighter, gender perspective, ISIS, jihadism, recruitment

Procedia PDF Downloads 140
8058 Terrorist Financing through Ilegal Fintech Hacking: Case Study of Rizki Gunawan

Authors: Ishna Indika Jusi, Rifana Meika

Abstract:

Terrorism financing method in Indonesia is developing at an alarming rate, to the point, it is now becoming more complex than before. Terrorists traditionally use conventional methods like robberies, charities, and courier services to fund their activities; today terrorists are able to utilize modern methods in financing their activities due to the rapid development in financial technology nowadays; one example is by hacking an illegal Fintech Company. Therefore, this research is conducted in order to explain and analyze the consideration behind the usage of an illegal fintech company to finance terrorism activities and how to prevent it. The analysis in this research is done by using the theory that is coined by Michael Freeman about the reasoning of terrorists when choosing their financing method. The method used in this research is a case study, and the case that is used for this research is the terrorism financing hacking of speedline.com in 2011 by Rizki Gunawan. Research data are acquired from interviews with the perpetrators, experts from INTRAC (PPATK), Special Detachment 88, reports, and journals that are relevant to the research. As a result, this study found that the priority aspects in terms of terrorist financing are security, quantity, and simplicity while obtaining funds.

Keywords: Fintech, illegal, Indonesia, technology, terrorism financing

Procedia PDF Downloads 142
8057 Combining Mobile Intelligence with Formation Mechanism for Group Commerce

Authors: Lien Fa Lin, Yung Ming Li, Hsin Chen Hsieh

Abstract:

The rise of smartphones brings new concept So-Lo-Mo (social-local-mobile) in mobile commerce area in recent years. However, current So-Lo-Mo services only focus on individual users but not a group of users, and the development of group commerce is not enough to satisfy the demand of real-time group buying and less to think about the social relationship between customers. In this research, we integrate mobile intelligence with group commerce and consider customers' preference, real-time context, and social influence as components in the mechanism. With the support of this mechanism, customers are able to gather near customers with the same potential purchase willingness through mobile devices when he/she wants to purchase products or services to have a real-time group-buying. By matching the demand and supply of mobile group-buying market, this research improves the business value of mobile commerce and group commerce further.

Keywords: group formation, group commerce, mobile commerce, So-Lo-Mo, social influence

Procedia PDF Downloads 391