Centenial Celebration

Transaction Search Form: please type in any of the fields below.

Date: April 29, 2024 Mon

Time: 9:20 pm

Results for islamist state

3 results found

Author: Parvez, Tariq

Title: The Islamic State in Pakistan

Summary: - The Islamic State, or Daesh, formally established its Khorasan branch for Pakistan, Afghanistan, and nearby areas in January 2015. - There is currently no evidence of Daesh's central leadership directing terrorist activities in Pakistan, but its ideology has inspired individuals and groups to recruit, raise funds, and carry out attacks to demonstrate their support. - Daesh's far-reaching ideology -- which includes opposition to the Shia minority, the Pakistani state, and the West, and support for a global Islamic Caliphate - can make it appealing to both existing and potential militants in Pakistan. - A comprehensive response to this threat by the Pakistani government would include greater security cooperation with Afghanistan, the elimination of terrorist safe havens, prioritizing police training in national counterterrorism strategies, and promoting programs to counter Daesh's dangerous ideology.

Details: Washington, DC: United States Institute of Peace, 2016. 5p.

Source: Internet Resource: Peace Brief 2013: Accessed October 17, 2016 at: http://www.usip.org/sites/default/files/PB213-The-Islamic-State-In-Pakistan.pdf

Year: 2016

Country: Pakistan

URL: http://www.usip.org/sites/default/files/PB213-The-Islamic-State-In-Pakistan.pdf

Shelf Number: 145074

Keywords:
Extremist Groups
ISIS
Islamist State
Radical Group
Radicalization
Terrorism
Violent Extremism

Author: Al Raffie, Dina

Title: The Identity-Extremism Nexus: Countering Islamist Extremism in the West

Summary: Countering Violent Extremism (CVE) initiatives in Europe have existed for much longer than those in the United States (US). In the Middle East and North Africa (MENA), as well as in select countries in Asia, several rehabilitation and de-radicalization programs have been established with the aim of reintegrating former Islamist militants into society. Despite making some progress in understanding the phenomenon, many of these countries have not succeeded in stemming the tide of extremism, as witnessed by the unprecedented number of foreign fighters— including a growing number of women and girls—traveling to join the Islamic State in Iraq and al-Sham (ISIS). The fact that the threat is now a combination of homegrown terrorist attacks and traveling, and potentially returning, foreign fighters has complicated matters further. States must now contend with a jihadist threat that has eclipsed that of al Qaeda's in its social media savvy and, more importantly, its control of territory. Osama bin Laden and his al Qaeda associates may have often talked of erecting "Islamic" states and the caliphate; Abu Bakr al-Baghdadi seems to have partially realized one. What has become apparent from following Western discourse on violent extremism is that there remains much confusion on how radicalization actually happens. While academics and practitioners have made ground in understanding the dynamics of radicalization, there are still many questions left unanswered. Moreover, the partially religious nature of the phenomenon adds an additional level of complexity, as the debate on the religion-ideology nexus is subjected to political censors and considerations, thus hindering progress. The sensitivity is understandable, and the focus on Islam has had real negative repercussions for Muslims. While religion is central to the debate on Islamist extremism, other factors crucial to processes of radicalization demand more serious consideration. One of these factors, and the focus of this report, is the role of identity in radicalization. Many scholars of political violence are by now aware of the role identity plays in radicalization, regardless of whether radicalization leads to violence. An overview of mainstream models of radicalization also shows that identity dynamics lie at the heart of the process. 3 This essay provides an overview of how identity relates to Islamist-inspired radicalization. The aim here is twofold. First, the essay highlights issues relevant to the identity-radicalization debate, and their relation to extremism. Then, drawing from this discussion, it develops a number of points to consider for those considering developing community-based rehabilitation and de-radicalization initiatives. The essay refers primarily to Western democratic contexts, and by no means covers the scope of the discussion on radicalization. The findings can be summarized as follows: • The inclusion of parents and vulnerable target groups is integral to the success of CVE efforts. • There is a need for role models to counter the "jihadi cool" identity promoted by Islamist extremist countercultures. • "It takes a network to defeat a network." In CVE this means creating a wide network of partners from the grassroots to the state-level, as opposed to few select organizations that are not representative of all stakeholders involved. • Government officials working in relevant fields should be involved in community efforts, with the aim of fostering trust and dialogue among all those involved in CVE efforts. • Developing counter-argumentation composed of a political counter-narrative and a religious counter-theology is key to the process of countering violent extremism.

Details: George Washington University, Program on Extremism, 2015.

Source: Internet Resource: Occasional Paper: Accessed November 10, 2016 at: https://cchs.gwu.edu/sites/cchs.gwu.edu/files/downloads/AlRaffiePaper-Final.pdf

Year: 2015

Country: United States

URL: https://cchs.gwu.edu/sites/cchs.gwu.edu/files/downloads/AlRaffiePaper-Final.pdf

Shelf Number: 141064

Keywords:
Extremism
Extremist Groups
Islamist State
Radical Groups
Radicalization
Terrorism
Violent Extremism

Author: Fainberg, Alisa

Title: Spread the Word: Russia Social Media on the Service of Jihad

Summary: The phenomenon of terrorists using the Internet for their purposes is not new: online activity of terrorist groups and terrorist individuals is registered since the late 1990s and thereafter underwent essential changes. Such an interest is caused first of all by those apparent advantages terrorists gained from the Internet: freedom from traditional media limitations, decentralization and safety, access to wider audience, etc. The engagement with cyberspace also changed the basic principles of communication within terrorist groups: from chain network to "all to all" communication, which in turn influenced many aspects of terrorist activity, such as propaganda, fundraising, etc. At the beginning, terrorist groups dealt with websites, and later on expanded their presence to forums and chatrooms, which, despite their effectiveness, still remained limited in reaching wide audiences, since were not highly publicized, and on the contrary, were frequently password-protected and used for inner communication. Nevertheless, there are online communication tools which were (and are) used by Al-Qaeda while planning the 9/11 terror attack and others. Also, Ayman al-Zawahiri, a successor of Osama bin Laden, places high emphasis on electronic warfare and "jihad of the bayan" (message). Today, due to such factors such as technological development and radical changes in the core of online communications, one can observe two main trends in terrorist online activity: grasping of popular social media networks and the dark web. While the dark web (as well as password-protected websites and forums) are used by terrorists mainly as a safe haven and for inner communication, mainstream websites and social media networks allow terrorist groups and individuals to turn their activities into borderless and cosmopolitan ones within the cyberspace and to get unparalleled tools for reaching out to as wide an audience as possible. Communication technologies used for planning and coordinating jihadists' actions, form the basis for a transition to a less organized structures and enhance the capacity of small terrorist groups, which are able to carry out their operations in a decentralized manner. Social media networks have become an integral part of jihadi groups' modus operandi and are used for the following purposes: offensive activities (gathering information on potential targets, threats of attacks, cyber attacks, etc.) operational uses (inner and outer communication, propaganda, radicalization, recruitment, fundraising, etc.) Despite the fact that the Islamic State group (ISIS) was obviously not the first terror organization to employ social media networks, the rise of ISIS has definitely highlighted the phenomenon, and tens (if not hundreds) of academic and media analytic papers were written on this subject. Indeed, without any doubts one may claim that it was the Islamic State (ISIS) group, who made the quantum leap and propelled jihadi involvement in online communication to the next level. Not least thanks to using internet technologies, ISIS has changed the very patterns of jihadi propaganda, and the full impact of these changes is still to be assessed. The group had developed a multidivisional media empire, which includes various divisions with certain specializations, such as al-Furkan Foundation, al-Hayat Media Center, al-Bayan Radio, etc., as well as smaller media groups targeting specific audiences in local languages. Social media networks became an essential part of that empire. Among other features characterizing ISIS' propaganda are wide coverage of audience, high diversity of propaganda materials, and active use of the most popular social networks such as Facebook, Twitter, YouTube, etc., which led to unprecedented ISIS expansion in the virtual world. For example, in just one month, from 17 September 2014 to 17 October 2014, the acronym "ISIS" was mentioned in Twitter about 4,000,000 times. Advantages terrorist groups gain from social media networks stem from their very nature. Each network is used according its general dedication: YouTube for uploading video materials (statements, footage, video games announcements, etc.), Twitter for real time updating, hashtags, and, for instance, for targeting Western news media in order to receive from them immediate reaction, etc. Moreover, democratic and dialogue-oriented, social media not just pushed the limits of propaganda distribution, but contributed to creation of a new form of jihadi propaganda - a public one, which is created, developed and distributed not by the official media centers of a particular terrorist group, but by its remote followers and supporters, who act at their own discretions. Seeking to expand their presence in social media for further advantages, ISIS media centers started to search for additional local social media platforms, and in 2013 put their attention to popular Russian social media networks: VKontakte (In Contact) and Odnoklassniki (Classmates), and for a relatively short period (compared to its presence on Facebook and Twitter) "occupied" these two with its propaganda activities. There are a number of pull factors which could explain such an attention of ISIS to the Runet (the Russian segment of Internet). First of all, Russian foreign fighters comprise a significant part of jihadists combating in Syria, and consequently are significant targets of ISIS propaganda. Secondly, until a certain point in 2014, Russian social media were hardly censored and security services did not initiate any measures against jihadi online activity in Vkontakte (VK) and Odnoklassniki (OK), which became another pulling factor for ISIS to turn its attention towards the Russian internet. This paper will examine the development of jihadist usage of Russian social media in the context of the branched system of ISIS' Russian-language media, the specifics of the message oriented toward Russian-speaking audience and translated through the platforms, as well as countering actions made by both government and private companies for a better understanding of the phenomenon.

Details: Herzliya, Israel: International Institute for Counter-Terrorism, 2017. 42p.

Source: Internet Resource: Accessed June 19, 2017 at: https://www.ict.org.il/Article/1987/russia-social-media-on-the-service-of-jihad

Year: 2017

Country: Russia

URL: https://www.ict.org.il/Article/1987/russia-social-media-on-the-service-of-jihad

Shelf Number: 146266

Keywords:
Islamist STate
Jihadist Groups
Social Media
Social Networks
Terrorism
Terrorist Propaganda