372 2499 2 PB

Download as pdf or txt
Download as pdf or txt
You are on page 1of 185
At a glance
Powered by AI
This issue of Perspectives on Terrorism discusses various topics related to terrorism research including articles, research notes, bibliographies, and book reviews.

Some of the main articles discussed include studies on alliance hubs in the international terrorist landscape, the impact of electoral participation on a terrorist group's use of violence, and a comparative analysis of terrorist networks' productivity and durability.

This issue includes bibliographies on Islamist narratives and counter-narratives as well as state sponsored terrorism, and a special research notes section introducing four case studies related to terrorism research.

PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Table of Contents
Welcome from the Editors 1

Report of the Jury on the TRI Award Competition for Best Ph.D. Dissertation on
Terrorism and Counter-Terrorism completed in 2013 2

I. Articles
Alliance Hubs: Focal Points in the International Terrorist Landscape 4
by Tricia Bacon

An Exploratory Study on the Impact of Electoral Participation upon a Terrorist Groups


Use of Violence in a Given Year 27
by Stephen McGrath and Paul Gill

Terrorist Networks Productivity and Durability: A Comparative Multi-level Analysis 36


by Arie Perliger

II. Research Notes


The Importance of Financing in Enabling and Sustaining the Conflict in Syria (and
Beyond) 53
by Tom Keatinge

Special Research Notes Section: Bart Schuurman, Guest Editor


Using Primary Sources for Terrorism Research: Introducing Four Case Studies 62
by Bart Schuurman

A History of the Hofstadgroup 65


by Bart Schuurman, Quirine Eijkman and Edwin Bakker

The German Sauerland Cell Reconsidered 82


by Quirine Eijkman

Operation Pendennis: A Case Study of an Australian Terrorist Plot 91


by Bart Schuurman, Shandon Harris-Hogan, Andrew Zammit and Pete Lentini

Who Are They and Why Do They Go?


The Radicalisation and Preparatory Processes of Dutch Jihadist Foreign Fighters 100
by Daan Weggemans, Edwin Bakker and Peter Grol

III. Resources
Bibliography on Islamist Narratives and Western Counter-Narratives (Part 1) 111

ISSN 2334-3745 i August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Compiled and selected by Judith Tinnes

Bibliography on State Sponsored Terrorism and Assassinations Abroad; with Special


Emphasis on the Assassination of 28 July 1914 that Triggered World War I 146
Selected and compiled by Eric Price

IV. Book Reviews


John Horgan, The Psychology of Terrorism [Revised and updated second edition]. New
York, NY: Routledge: 2014. 184 pages, US$170.00 [Hardcover], ISBN: 978-0-415-69800-9;
US$42.95 [Paperback], ISBN: 978-0-415-69802-3. 153
Reviewed by Jeff Victoroff

Andrew Silke (Ed.), Prisons, Terrorism and Extremism: Critical Issues in Management,
Radicalisation and Reform. New York, NY: Routledge, 2014. 312 pages, US$ 150 .00
[Hardcover], US$ 45.95 [Paperback], ISBN-13: 978-0415810371. 156
Reviewed by Jacqueline Bates-Gaston

Counterterrorism Bookshelf :
47 Books on Terrorism & Counter-terrorism Related Subjects 158
by Joshua Sinai

V. News
News from the National and Regional Networks of Ph.D Thesis Writers 171

VI. Notes from the Editor


About Perspectives on Terrorism 172

ISSN 2334-3745 ii August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Welcome from the Editors


Perspectives on Terrorism, Vol. 8, no. 4 (ISSN 2334-3745)

Dear Reader,

We are pleased to announce the release of Volume VIII, Issue 4 (August 2014) ofPerspectives on Terrorismat
www.terrorismanalysts.com. Our free online journal is a joint publication of theTerrorism Research
Initiative(TRI), headquartered in Vienna, and theCenter for Terrorism and Security Studies (CTSS),
headquartered at the University ofMassachusetts Lowell campus.

Now in its eighth year,Perspectives on Terrorismhas over 4,300 regular subscribers and many times more
occasional readers worldwide. The Articles of its six annual issues are fully peer-reviewed by external referees
while its Research Notes, Resource and Book Reviews sections are subject to internal editorial review.

We begin this issue by announcing Dr. Tricia Bacon as the winner of the competition for the Best
Dissertation on Terrorism and Counter-Terrorism published in 2013. The Jurys report also provides the
honorable mention of authors whose theses were judged second and third best. A summary of Dr. Bacons
thesis is provided as the first research article in this issue, in which she examines alliance behaviour among
terrorist networks and the vulnerabilities that come with alliances. This is followed by an article by Stephen
McGrath and Paul Gill examining the relationship of terrorist groups attack patterns and participation
of front organisations in democratic electoral contests. Next Arie Perliger shows in his article how a
sympathetic, supportive community is essential for a terrorist networks durability.

Our Research Notes section begins with insights from Tom Keatinge on the various sources of financing that
are sustaining the conflict in Syria. This is followed by a Special Research Notes Section, assembled by guest
editor Bart Schuurman of the Center for Terrorism and Counterterrorism (CTC) in the Netherlands. He and
his colleagues provide four case studies of jihadist-related terrorism that draw heavily from primary source
materials. Three of these focus on homegrown jihadist groups in the Netherlands, Germany and Australia,
while the fourth examines the backgrounds of Dutch jihadists who travelled to Syria as foreign fighters.

Dr. Judith Tinnes has compiled an extensive bibliography on Islamist narratives and Western counter-
narratives, and Eric Price has compiled a bibliography on state-sponsored terrorism and assassinations. Book
reviews by Jeff Victoroff and Jacqueline Bates-Gaston can be found in Section IV of this issue. Finally, our
book reviews editor, Joshua Sinai, presents summary reviews of 47 new publications in the field of terrorism
and counterterrorism.

The current issue of Perspectives on Terrorism was prepared at the University of Massachusetts at Lowell. The
October issue will be assembled by Editor-in-Chief, Prof. em. Alex P. Schmid.

Sincerely,

Professor James J.F. Forest


Co-Editor, Perspectives on Terrorism

ISSN 2334-3745 1 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Report of the Jury on the TRI Award Competition for Best Ph.D. Dissertation
on Terrorism and Counter-Terrorism completed in 2013
Over the course of the preceding academic year, the Directors of the Terrorism Research Initiative received
and reviewed 29 valid entries (academic theses in the field of Terrorism Studies either completed or defended
in 2013) for this annual competition. The final deadline to submit entries for this years competition was 31
March 2014.

While the gender distribution was practically even14 of the 29 dissertations were written by female
scholarsthe country distribution was more uneven. The scholars submitting their theses to the competition
came from eleven countriesAustralia, Canada, Germany, India, Ireland, Israel, Pakistan, Poland,
Switzerland, United States, and United Kingdom. This less than global spread can partly be explained by
the fact that one of the requirements was that the thesis had to be submitted in (or translated into) English.
Except in one case where a Ph.D. supervisor submitted a doctoral thesis, all other dissertations were
submitted by the authors themselves.

The jury used six criteria for the evaluation, the most important being these:

Is it the product of in-depth research?

Does it show originality in terms of introducing new data, theory or methodology?

Does it show novelty/uniqueness in its findings?

The topics ranged from State Sponsored Terrorism to Socio-psychological Profiles of Terrorist Leaders in Israeli
Prisons, and from The Potential Terrorist Threat of European Converts to Islam to Terrorised into Compliance:
Why Countries Submit to Financial Counterterrorism. Many of the dissertations were of almost equal quality,
which made it difficult for the jury to rank them. Notably, the five top-ranking dissertations were all written
by female scholars. After several rounds of evaluations, three finalists were selected by the jury, and from
these the winner.

The winner of the TRI Best Thesis Award 2013 is Dr. Tricia Bacon. She is is currently a Professorial
Lecturer at American University in Washington D.C. Her thesis, which was defended with distinction at
Georgetown University, is titled Strange Bedfellows or Brothers-in-Arms: Why Terrorist Groups Ally. An
article based on parts of her dissertation has been included in this issue of Perspectives on Terrorism. A
book-length volume based on her nearly 800-pages long text will be published by Pennsylvania University
Press later this year. The Jury noted with appreciation the wide range of primary sources utilized by the
author (including archival information, declassified documents from the Harmony database on Al-Qaeda,
groups statements, interviews and trial transcripts) and the amount of field research conducted in North
Africa, the Near East and South Asia. The combination of quantitative methods resulting in the testing of
hypotheses with a series of historical case studies led Dr. Bacon to reach findings that contradict the widely
held assumption that terrorist groups easily form alliances. On the contrary, she found thatfor lack of trust
and other reasons (which she details in her article in this issue)alliances are rare, with less than one percent
of terrorist attacks over a period of more than a quarter century being conducted by more than one terrorist
group. Only very few armed groups manage to become what she terms alliance hubs like al-Qaeda. As
readers of Perspectives on Terrorism will recognise, there is a considerable need for excellent research on
the organisational behaviour and decision-making of terrorist groups. The winner in our competition has
significantly expanded our knowledge in this area. The jury was impressed by Dr. Bacons command of the
materials studied, the elegant style in which the thesis was written and the convincingly argued chief finding

ISSN 2334-3745 2 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

that contradicts conventional wisdom. For her ground-breaking work the Jury gave her the 1st Annual TRI
Thesis Award of U.S. $1,000.-

A close second in the competition for the TRI Thesis Award 2013 was the dissertation submitted by Dr.
Virginie Andre from Monash University, Australia. Based on many months of field work, her dissertation
Framing Separatist Terrorism in Southern Thailand: Collision, Collusion and Convergence, utilises
interviews with insurgents and non-insurgents alike while also making excellent use of locally collected
leaflets and online materials. Digging deep into the history of the conflict (which has its roots in Siams
conquest of the region in 1906) and using quasi-anthropological methods of investigation, she explains how
an originally ethno-nationalist movement without a charismatic leader transformed into what she terms a
glocal neojihadist struggle. The rapid expansion of jihadist ideologies from Middle Eastern terrorist groups
to other regions of the world becomes more understandable in the light of her penetrating analysis. Dr.
Andre has already received several awards for her sophisticated dissertation and we hope that an academic
publisher will soon make her work more widely known.

The third finalist in the TRI Thesis Award competition is Dr. Donna G. Starr-Deelen, a lawyer by training
and now an Attorney practicing in Kensington, Maryland. She received a Ph.D. degree in Peace Studies from
the University of Bradford (UK) for her thesis on United States Use of Force against Terrorism and the
Threat of Terrorism. While also utilising interviews to gather information (though far fewer than the other
two finalists), the author draws mainly on a careful analysis of open source materials on the administrations
of U.S. Presidents Ronald Reagan, George H.W. Bush, Bill Clinton and George W. Bush. She uses as an
explanatory lens a pattern of foreign policy making first noted by Harold Koh in his book The National
Security Constitution a pattern in which presidential actions in foreign affairs are characterised by executive
initiative, congressional acquiescence, and judicial tolerance. The post-9/11 power grab by George W. Bush
and Dick Cheney is attributed to the combination of three factors: (i) the special dynamic of terrorism in
which a frightened public demands action after a major attack while accepting high levels of government
secrecy; (ii) a lack of congressional incentives and political will to practice effective oversight of the executive
when it uses force against international terrorism; and (iii) the tendency of American courts to defer to the
executive branch when it comes to national security decisions. A monograph titled Presidential Policies on
Terrorism, based on Donna Starr-Deelens dissertation, has just been published by Palgrave Macmillan (New
York, May 2014).

The Jury wishes to congratulate the finalists and offer our thanks to all participants who submitted their
thesis for the TRI thesis award competition. Given the positive response of the research community to our
first call to participate in this 2013 competition, the Terrorism Research Initiative has decided to make the
TRI Thesis Award an annual feature of its portfolio of activities. In the next round, the award competition
deadline for submitting a thesis completed or submitted in 2014 is 31 March 2015. We look forward to
reviewing another great collection of entries.

The Jury: Alex P. Schmid (Chair), Robert Wesley, James J.F. Forest

ISSN 2334-3745 3 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

I. Articles

Alliance Hubs: Focal Points in the International Terrorist Landscape


by Tricia Bacon

International terrorist alliances pose a threat in that they provide opportunities for groups to bolster their
operational effectiveness, range, and efficiency as well as enhance their legitimacy and stature. However,
they remain rare because alliances expose partnering organizations to serious vulnerabilities, and terrorist
organizations are ill-suited to forge these kinds of commitments. When alliances do occur, they tend to cluster
around a small number of groups, termed alliance hubs, which demonstrate an aptitude for forging partnerships.
The prevailing notion that terrorist groups with shared threats or ideologies will naturally gravitate toward
hubs mischaracterizes the nature of relationships among these illicit, clandestine, and violent organizations and
predicts that alliances should occur more frequently than they do, and that alliances should form where none
exist. Rather than precipitating alliances, shared ideology and enemies act as identity features that guide partner
selection. Hubs function as focal points by fulfilling organizational adaptation and learning needs for groups that
lack self-reform capacity. This offers under-utilized opportunities to exploit and disrupt these relationships.

Keywords: Group decision-making, organizational behavior, collaboration

Introduction
As for the answer to your question, why did we join Al Qaeda? We say, why shouldnt we join Al Qa-
eda? God ordered us to be united, to be allied, to cooperate and fight against the idolaters in straight
lines. We are a jihadi ancestral community.
Abelmalek Droukdal, leader of al-Qaida of the Islamic Maghreb, formerly the Salafist Group for
Preaching and Combat (GSPC), on his groups 2006 alliance with al-Qaida
By 2005, the predominant Algerian Sunni terrorist group, the GSPC, was a shadow of its former self. After
two amnesties and more than a decade of conflict, its decimated ranks were pursuing a cause that no longer
resonated with the war-weary Algerian public. Once an existential threat to the state, the jihadist insurgency
operated largely as a law and order problem relegated to the outskirts of the country. Newly radicalized
Algerian militants gravitated to the insurgency against the United States in Iraq, rather than join the
discredited cause at home.[1] Surrendering members reported that the groups fighters struggled to survive
on rations and lived in desolate conditions.[2]

Then, on the five-year anniversary of the 9/11 attacks, al-Qaida appointed the GSPC as its affiliate in North
Africa. Shortly thereafter, the newly minted al-Qaida in the Islamic Maghreb (AQIM) unleashed a violent
campaign that shattered the Algerian Governments claims that the insurgency was on the verge of defeat.
AQIM adopted al-Qaidas modus operandi of suicide operations, which increased the lethality and reach of
its attacks. It struck high profile targets, like the United Nations building in the heart of the Algerian capital, a
locale considered secure against the groups traditional bombings and ambushes.[3] AQIM expanded its safe
haven and smuggling activities in the Sahel region, and members outside its traditional Algerian base joined
the group.[4] Significant credit for AQIMs rejuvenation went to its alliance with al-Qaida.[5]

AQIMs post-alliance transformation reflects the fact that allying with another terrorist organization creates
opportunities for groups to bolster their operational effectiveness, range, and efficiency as well as enhance
their legitimacy and stature; sometimes it even allows them to re-invent their image.[6] Like the increased

ISSN 2334-3745 4 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

destruction produced by AQIMs adoption of the tactic of suicide operations following its alliance with
al-Qaida, terrorist groups with allies conduct more deadly attacks, resulting in a higher average number of
fatalities and injuries to both victims and attackers alike.[7] In addition, alliances increase terrorist groups
longevity and make them more resilient. For example, terrorist organizations with allies are 50 percent less
likely to disband or collapse following leadership decapitation than those without them.[8]

Terrorist alliances clearly pose a threat; however, they remain rare.[9] For example, the apex of
cooperationa joint operation involving allied groupsoccurred in less than one percent of terrorist attacks
between 1970 and 2007.[10] The paucity of alliances reflect the hurdles that terrorist groups face when
attempting to forge credible commitments.[11] All entities allying in an anarchic environment face obstacles,
but terrorist groups secretive and illicit nature exacerbates them and thereby makes alliances more difficult.
Terrorist groups also face additional barriers because of their strong in-group identification and insular
qualities.[12] As a result, terrorist organizations struggle to form alliances.

These obstacles shed some light on why terrorist alliances occur infrequently, but fail to explain the puzzling
distribution of terrorist alliances. Terrorist alliances tend to form in closely-knit clusters or cliques of
cooperating organizations with a small number of groups acting as focal points.[13] Such alliance hubs are,
in essence, an anomaly among anomalies. Hubs exhibit an unusual propensity to overcome the collaboration
hurdles that stymie most groups. In addition, their activity accounts for a disproportionate number of these
dangerous relationships. But why are alliance hubs so effective at forming these partnerships? Why do other
groups seek hubs as partners?

Counterterrorism officials and terrorist groups themselves, i.e. the GSPCs justification of its relationship
with al-Qaida, often attribute alliance behavior to shared ideologies and common enemies.[14] Alliances
are indeed strongly correlated with both.[15] However, the rarity of terrorist group alliances is inconsistent
with these ideational or instrumental motives. If ideological solidarity or common enemies stimulated
alliances, they should occur more frequently, and alliances should form where none exist. In addition, neither
explanation can account for the timing or duration of terrorist alliances. For instance, the GSPC shared an
ideology as well as enemies with al-Qaida for years before God ordered them to unite.

Given the danger posed by alliance hubs, governments need to better understand what causes them. Overall,
the dearth of well-developed theories that explain international terrorist alliance behavior, particularly
compared to intra-conflict or inter-state alliances, has stunted efforts to disrupt and prevent these dangerous
relationships. Not surprisingly, governments have had little success against international terrorist alliances,
even though disrupting them has been a priority for over a decade. Government action has not severed any
of the alliances involving the premiere contemporary alliance hub, al-Qaida, even though as early as 2003, the
U.S. Counterterrorism Strategy asserted: [t]he interconnected nature of terrorist organizations necessitates
that we pursue them across the geographic spectrum to ensure that all linkages between the strong and the
weak organizations are broken, leaving each of them isolated, exposed, and vulnerable to defeat.[16] For
example, the public break between al-Qaida and the Islamic State of Iraq and Syria (ISIS) earlier this year was
caused by internal disagreements about the scope of ISISs mission and its tensions with another al-Qaida ally,
al-Nusrah Front. Though the ISIS-al-Qaida alliance was plagued with problems from the outset, governments
proved unable to exploit these fissures.[17] If governments understand alliance hubs appeal and their
vulnerability, they can better identify when alliances may occur and more effectively intervene.

This article provides an excerpt of the findings in my dissertation Strange Bedfellows or Brothers-in-Arms:
Why Terrorist Groups Ally, forthcoming with the University of Pennsylvania Press. In it, I propose a theory
of international terrorist alliance formation and sustainment based on a combination of organizational

ISSN 2334-3745 5 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

theory and constructivism. Using qualitative methods, including within-case comparisons, cross-case
comparisons, and process tracing of nine international terrorist dyads between 1968 to 2011 and two hubs
alliance behavior, I argue that organizational learning and adaptation needs motivate alliance searches,
while identity, particularly ideology, constrains partner selection and helps partnering groups to build trust.
Furthermore, I find that alliance sustainment hinges on organizational need fit between partners, the nature
of the organizational needs driving the alliance, as well as partners ability to forge a shared identity.

This article focuses more narrowly on my dissertations findings on alliance hubs, specifically why these
organizations attract numerous partners. It begins by discussing the obstacles and benefits to terrorist
alliances. It then defines international terrorist alliances and situates them within the alliance literature. Next,
it delves into what constitutes an alliance hubgroups that demonstrate anomalous success in attracting
partners and forging alliances, thereby increasing the terrorist threat. It proceeds by discussing how existing
theories offer little insight into their behavior before proposing an alternative explanation for why terrorist
alliances cluster around hubs. In the interest of space, this article selectively draws on the dissertations
alliance hub case studies to illustrate its arguments, rather than providing the full case studies. Instead of
being a product of common ideology or shared threats, alliance hubs acquire their positions because of their
willingness and ability to fulfill others organizational adaptation and learning needs as well as by possessing
identity traits that make them acceptable partners to numerous other groups. The article concludes by
discussing follow-on research on alliance hubs and the implications that flow from these findings.

Defining International Terrorist Alliances


International relations scholar Ole Holsti contended that [a]lliances are apparently a universal component
of relations between political units, irrespective of time and place.[18] As fundamentally political actors, this
applies to terrorist groups. However, beyond agreement on its political dimension, terrorism is a notoriously
difficult concept to define, and debates persist about the appropriate use of the term.[19] At a minimum, an
act of terrorism generally contains three components: 1) political aims and motives; 2) violence or threats of
violence; and 3) intended psychological repercussions beyond the immediate victim or target.[20] Terrorist
organizations include entities that consistently employ such violence with some defined membership, chain
of command, command and control mechanisms, and in-group identity.

Alliances consist of relationships of security cooperation between terrorist groups that involve mutual
expectations of coordination or consultation in the future.[21] Such relationships are distinct from the more
prevalent forms of low-level collaboration between individuals who do not represent organizations or ad hoc
organizational cooperation without shared expectations for future cooperation. While these other forms of
cooperation pose fewer hurdles and thus may be more common, alliances offer opportunities for deeper and
more sustained exchanges, and therefore, can pose a greater threat.

International alliances refer to partnerships between terrorist groups that emerge from political markets
that cross state and/or conflict boundaries. After the internationalization of terrorism, terrorist groups
increasingly forged alliances with one another within the anarchic international system.[22] While
international terrorist alliances have received less scholarly attention than intra-conflict or inter-state
alliances, they have produced some of the most prolific terrorist attacks and defined the terrorist threat for
the past decade. Beyond al-Qaidas abundant alliances, notorious examples include the Japanese Red Armys
attack on Lod Airport in Tel Aviv in 1972, as well as the coordinated kidnapping and hijacking in 1977 by the
Red Army Faction (RAF) and the Popular Front for the Liberation of Palestine (PFLP).

Significantly, the PFLP, JRA, and RAF were not rivals within a shared conflict, so they did not compete in

ISSN 2334-3745 6 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

the same primary political and resource market. Well-known examples of intra-conflict relations include
the perpetual jockeying between Afghan mujahidin factions after the Soviet withdrawal in 1989 and the
constantly shifting alliances among militant Palestinian factions. International terrorist alliances differ
from intra-conflict relations among violent non-state actors in important respects that necessitate separate
theorizing and empirical work about the causes of their alliance behavior. A shared political market creates a
competitive dynamic, particularly as groups proliferate over time due to group fractionalization. Competitor
terrorist organizations thus constantly maneuver for primacy, and this affects their behavior, including
alliances, in a variety of ways.[23] For example, competition influences the tempo and scale of violence as
well as the tactics that competitor groups employ, such as suicide attacks.[24] In competitive situations,
groups increase the pace or broaden the scope of their attacks, as Kydd and Walter claim that, outbidding
should occur when multiple groups are competing for the allegiance of a similar demographic base of
support.[25]

Rival groups operating within a shared conflict seek to acquire their share of resources, power, and position
at the expense of one another, thus engaging in cooperation selectively, carefully, and briefly. While not
all conflicts involving multiple terrorist groups reach the threshold of a civil war, Fontini Christias work
on alliance behavior within multiple party civil wars parallels what occurs in many conflicts with multiple
terrorist groups. Alliances within a conflict fluctuate based on groups assessments of relative power position
vis--vis one another.[26] Unless one group is powerful enough to win outright or has a monopoly in the
conflict, the within-conflict alliance terrain constantly shifts in response to changes in power, including
defections, betrayals, group fracturing, and losses on the battlefield, detentions or targeted killings. Alliances
thus tend to be tactical and temporary, governed by a desire to acquire the maximum resources as part of
the smallest-winning coalition, as long as the risk of exploitation by stronger parties in that coalition is
manageable.[27] In other words, power considerations trump all others. Power calculi not only subsume
identity considerations, group leaders and elites actively manipulate identity narratives to suit their
instrumental needs.[28]

In contrast, my research focuses on relations among dyads of terrorist organizations that operate in different
primary conflicts and political markets, where relative power considerations do not readily apply.[29] While
some scholarship distinguishes between domestic and international terrorist attacks, much of the work on
terrorist alliances does not differentiate between these two types of alliances.[30] However, objectives such
as creating alliances to establish the smallest-winning coalitions or determining relative power position
do not transfer to non-competitive, international relationships.[31] Because they do not compete in the
same political market, non-competitors can share assets, even members, funds, and safe haven, without
the same concerns that doing so will negatively affect their position relative to one another. They need not
worry that resources or skills shared today will be used against them tomorrow. Rather than vying for the
same resources in a zero-sum environment, resources among non-rivals can have a positive-sum value. As a
result, theories must account for these differences in order to understand international terrorist alliances and
alliance hubs in particular.

Impediments and Benefits of Alliances


Even though terrorist groups can accrue benefits through alliances, they struggle to forge credible
commitments, an essential ingredient for alliances. By design, most terrorist organizations are insular,
secretive, and lack the requisite transparency to assure their partners that they intend to honor future
promises and obligations.[32] With uncertain and often short lifespans, few have the requisite shadow
of the future to make attempting cooperation worth the risk.[33] To compound these problems, terrorist

ISSN 2334-3745 7 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

groups often lack reputations as trustworthy partners.[34] Terrorist groups cannot overcome mutual distrust
by creating institutions to bind themselves to agreements, as states do. Nor can they enter into contracts
enforceable by an outside institution, like a firm. Thus, both sides have incentives to use cooperation
opportunistically to improve their own security and then defect before reciprocating. Meanwhile, adversaries
seek to exploit these fears to undermine cooperative relationships and weaken partnering organizations.[35]

At least four other major hurdles compound these problems. First, terrorist groups can be particularly leery
of the security-autonomy tradeoff, in which an organization exchanges some independence for the improved
security offered by the alliance partner. For groups with strong in-group identities, relinquishing autonomy
can provoke internal dissension and thereby create instability within the partnering groups.[36] Second,
partnering with another terrorist organization sometimes generates additional counterterrorism pressure
as adversary governments respond to the threat posed by the alliance.[37] Third, groups risk discrediting
themselves in the eyes of their real or perceived constituents, which can range from the international
community to local support bases, with their ally choices or if their allies engage in behavior unacceptable
to key audiences.[38] Lastly, and of the greatest concern to terrorist organizations, alliances increase the
possibility of betrayals or leaks as they expand the circle of people with knowledge of groups activities and
members.

The obstacles to alliances discussed raise the question: what could groups acquire through an alliance
that would warrant undertaking such risks? In a RAND study on terrorist interactions, Kim Cragin et al.
explained that interactions allow terrorist groups to elevate the threat that they pose to state governments
by sharing best practices and therefore multiplying their own efforts with the knowledge and know-how
from other militant groups.[39] Alliances offer avenues for groups to acquire new capability, expand their
capacity or conduct activities more efficiently.[40] Groups can train one another in new skills and teach one
another improved techniques. An ally may improve its partners ability to acquire resources and materiel,
like weapons or documents. For instance, the West German Red Army Faction approached Fatah in 1970
primarily to access weapons that were not readily available in West Germany.[41] Allies can offer facilitation
or logistical assistance to allow their partners access to previously denied areas or more secure routes where
they currently transit.

Allied groups can also help one another to withstand counterterrorism pressure and regroup after losses.
Groups that control territory or have unfettered access to a sanctuary can extend safe haven to their
partnersa particularly coveted resource during rebuilding phases. Without its allies in Pakistan, it is
unlikely that al-Qaida could have survived the United States invasion of Afghanistan and the subsequent fall
of the Taliban. Under some circumstances, alliances offer intangible benefits, such as improved credibility,
legitimacy, and prestige, which can translate into assets like recruits or funds. Groups can project themselves
as part of a broader movement by allying with another terrorist organization, a particularly valuable asset
when the resonance of the original cause begins to wane.

In sum, by allying with another organization, groups can access assets that may otherwise be unavailable.
Under some conditions, the potential benefits warrant the risks. For some groups, the resources and skills
acquired through an alliance can be the difference between survival and extinction or between victory and
defeat.

Alliance Hubs
Rather than being evenly distributed among dyads, terrorist alliances often form closely-knit clusters with
a group or groups operating at the center of each cluster.[42] In that respect, terrorist groups alliances bear

ISSN 2334-3745 8 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

similarities to businesses and military innovation patterns. Strategic blocks refer to firms that are tied to
each other more densely than most businesses and rooted at the center of networks.[43] Similarly, critical
nodes operate at the center of military innovation networks.[44] Likewise, alliance hubs act as focal points for
terrorist partnerships around which other groups and relationships orbit.

This phenomenonalliance hubshas previously been observed among terrorist organizations, though
it has not been explicitly identified and studied as such. Following the internationalization of terrorism
in 1968 and accompanying proliferation of terrorist ties across national boundaries, some speculated that
this collaboration was a state-driven phenomenon, a conspiracy hatched by the Soviet Union and the
allied Communist bloc to coordinate terrorist groups efforts against the West.[45] While the Soviet Union
sponsored some terrorist groupsincluding one of the most influential alliance hubs in the 1970s, the PFLPs
Special Operations Group, discussed belowit did not manage relationships among them.[46]

Instead, alliance hubs, particularly the PFLP and Fatah, operated at the epic center of the enhanced
cooperation. In his quantitative examination of terrorist relationships in 1979, scholar Kent Layne Oots
concluded that some groups acted as major powers providing aid and resources to others, primarily those
of similar ideological orientation.[47] Similarly, in his trenchant examination of al-Qaida, journalist Jason
Burke likened the groups alliance behavior to a great power. He argued that al-Qaida acted similarly to the
United States or Soviet Union during the Cold War in terms of its alliance behavior within the Sunni Islamic
militant milieu.[48] Alliance hubs act as focal point organizations around which numerous alliances orbit
and to which other terrorist groups are drawn. They demonstrate an exceptional ability to work closely with
numerous partners and to maintain those relationships.

Alliance hubs can operate on a regional level or an international level. Regional-level hubs ally with fellow
terrorist groups that are concentrated in a geographically contiguous area or in a grouping of countries with
some overarching shared historical, cultural or linguistic qualities. For example, Hezbollah has acted as a
regional alliance hub in the Middle East, more specifically in the Levant. A regional-level alliance hub often
has the advantage of proximity, a common language or overarching shared ethnic identity. A regional hub
may have relationships outside of the region, but it serves as a focal point of a regionally-based cluster. An
international-level hubs relationships are not limited to any particular region; instead, they are transnational,
drawing in groups from various states and regions. Fewer bases for a common identity exist, as do linguistic
and cultural barriers as well as informational and access hurdles. International hubs are, not surprisingly,
quite rare and extremely influential, when they do occur.

Alliance hubs existence poses a puzzle in light of the obstacles to cooperative relationships. Alliances
are the exceptions. Generally, terrorist groups struggle to form international alliances due to structural,
organizational, and ideological hurdles, not to mention the geographic distance. Yet some organizations
forge a disproportionate number of alliances. Hubs are, in essence, an anomaly of an anomaly; their alliance
success defies expectations about the rarity of such partnerships and obstacles to them. Alliance hubs are by
definition deviant cases in that they show a surprising propensity to form alliances.[49] Their existence raises
a host of questions, central among them: why do they attract other terrorist organizations as partners?

One component of my dissertation involved delving into this question by conducting comparative case
studies involving two alliance hubs: al-Qaida and the PFLP. Much of the scholarship on al-Qaidas experience
as an alliance hub focuses on its unique characteristics in ways that do not shed light on the broader
phenomenon.[50] Moreover, this overlooks the fact that al-Qaida is not the first alliance hub, nor will it be
the last. Given the rarity of alliance hubs, the threat they pose, and the need to move beyond correlations
to determine the causal pathways, my dissertation employed a qualitative methodological approach to this

ISSN 2334-3745 9 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

puzzle. Quantitative research demonstrates, for example, a strong correlation between alliances and both
common ideologies and shared enemies, but does not illuminate the causal process by which these variables
produce alliances or alliance hubs.[51]

Hubs with international reach, as opposed to regional hubs, are simultaneously the rarest and the most
difficult to explain theoretically, given the obstacles to cooperation and the propensity for relationships to
form between proximate groups.[52] Therefore, I employed a cross case comparison coupled with within
case process tracing in order to engage in both theory building and testing.[53] As mentioned earlier, in
order to forge a broader theory of international terrorist alliance formation and alliance sustainment, my
dissertation also examined nine terrorist dyads involving alliance hubs, selected based on their variation
on the independent variables discussed below. This article focuses on a sub-component of the dissertation:
determining the how and why of alliance hubs.

I conducted comparative case studies of two international alliance hubsthe Popular Front for the Liberation
of Palestine (PFLP) and al-Qaidaselected based on their variation on three independent variables discussed
below: threat, ideology, and organizational structure. The two groups alliance hub tenures did not overlap
and they operated under different international systems, as the PFLP was a hub from 1969 to 1979 during
the Cold War bi-polar system, while al-Qaidas time as an alliance hub began in the early-1990s and occurred
under the unipolar, United States-dominated system. While both defined their enemies expansively, they
faced different threats, as al-Qaida insisted that the United States was its primary threat, while Israel posed
the greatest threat to the PFLP. In addition, they hailed from different ideologies. The PFLP was a Marxist,
leftist organization with a clear ethno-nationalist streak, while al-Qaida adhered to a Sunni jihadist ideology
and sought to transcend nationalism.

Lastly, in contrast to the conventional explanations that point to ideology and enemies, this article proposes
an organizational theory-based explanation for alliance hubs. Therefore, I selected hubs with organizational
variation, including size and structure, as a proxy for the organizational needs theory discussed below.
Al-Qaida[54] operated solely as a terrorist group with a few hundred members, while the PFLPs complex
organizational structure included a political party and non-terrorist functions as well as thousands of
followers.[55] Thus, the two selected hubs exhibited variation on each of the independent variables discussed
in the next section, which offered an opportunity to test which theories elucidate how they developed into
alliance hubs.

Theoretical Frameworks and Findings


To date, much of the work on international terrorist alliances assumes the groups motives for allying. The
existing literature and prevailing wisdom frequently assert that common enemies or shared ideologies
motivate relationships, yet remain silent on the many instances when these factors exist, but do not produce
an alliance. For example, in a monograph examining technology transfers between terrorist organizations,
Sharing the Dragons Teeth, Cragin et al. justified their selection of three dyads of international terrorist
cooperation: 1) Jemaah Islamiyah (JI) and other Sunni Islamist groups in Southeast Asia; 2) Hezbollah and
Palestinian militant organizations; and 3) the Provisional Irish Republican Army and the Revolutionary
Armed Forces of Columbia (FARC) as follows:

JI shares an ideological worldview and overarching objective with other Islamist militant groups in
Southeast Asia. We therefore expected that JIs rationale for engaging in technology exchanges would
be ideologically driven. Hizballah and most Palestinian militants, however, derive from different,
albeit Islamic, ideologies. With regard to Hizballahs rationale, we therefore estimated that it would

ISSN 2334-3745 10 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

be driven more by its enmity toward Israel than by religious ideology. Finally, we expected that PIRA
and FARC would represent the most disparate ideological worldviews, exchanging technologies exclu-
sively for profit.[56]
Their goal was to select relationships that stemmed from different motives to test their theory on technology
transfers. In so doing, they assumed the relationship motives post hoc based on shared characteristics. This
example is not intended as a criticism of these authors or their work, which was not focused on explaining
alliances, but to illustrate the tendency even for scholars to assign the reasons for these relationships, rather
than to explore them.

Moreover, the processes by which these frequently cited variables produce and sustain alliances are rarely
articulated. What constitutes shared ideologies or enemies is frequently applied in an elastic way, fitted to
explain the presence or absence of a partnership on a case-by-case basis with little consistency or predictive
accuracy. It remains unclear how common enemies and threats should be weighed or what level of
ideological compatibility is necessary for organizations to ally. It is even less clear how these variables would
produce an alliance hub. Therefore, after exploring the inadequacy of these theories, this article offers an
alternative framework for understanding alliance hubs, rooted in organizational theory and coupled with
constructivism.

Responding to Threat
Like intra-conflict alliances, the robust inter-state alliance literature offers little insight into understanding
international terrorist alliance behavior. Much of the dominant realist paradigms emphasis on relative power
does not apply to international terrorist alliance dynamics, for the reasons discussed above. However, the
main existing work that proposes a theory of international terrorist alliances draws on a variation of neo-
realism: balance of threat theory. Stephen Walts balance of threat theory proposes that states ally to balance
in response to threat, defined as offensive power, aggregate power, geographic proximity, and perceived
aggressive intentions.[57] Ely Karmon built on Walts theory and proposed that terrorist groups in the
international arena unite when they feel threatened and share a perception of the nature of a threat from the
international system.[58]

Terrorist groups, including alliance hubs, sometimes invoke this rationale to explain their alliance behavior,
and quantitative research demonstrates that groups with a shared target have a higher probability of working
together.[59] The idea that the Crusader-Zionist threat required unity underlain bin Ladens numerous
exhortations to Sunni terrorist groups to ally with al-Qaida.[60] The GSPCs declaration of its alliance with
al-Qaida also alluded to the need to ally with a hub to balance against a shared threat.

The destruction of war, the difficulty of the present situation, and the unified coalition of our enemies
against us make it necessary for us to confront this coalition with our own coalition, their alliance
with our alliance, face their unified forces against our unified forces The United States of America
will only be defeated by a United States of Islam [I]t became clear to us that our brothers in Al-Qa-
ida organization under the lead of Mujahid Shaykh Usama Bin Ladenmay Allah protect himare
the best ones in this era to unify the scattered Muslims against their enemies and to lead them in
their present war.[61]
By extension, this theoretical framework would posit that alliance hubs emerge to form a counter-balancing
coalition in response to threat. From a balancing perspective, this makes intuitive sense. Terrorist groups
operate at a power disadvantage vis--vis their enemies and thus seek partners to help balance against the
threat. Groups feeling similarly threatened by the distribution of power in the international system should

ISSN 2334-3745 11 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

then flock to hubs.

In the case of al-Qaida, this theory predicts that the threat from the United States hegemony encouraged
its emergence as an alliance hub and attracted terrorist groups that shared its perception of the threat from
the United States.[62] However, an examination of al-Qaidas alliance hub experience as well as that of
the PFLP quickly reveals deficiencies in this theory. Following the United States deployment of forces to
Saudi Arabia in 1991, the nascent al-Qaida shifted its attention from Communist forces and identified the
United States as its greatest threat. This corresponded with the Soviet Unions downfall and the emergence
of a unipolar international system with the United States as the sole super power. As al-Qaida burgeoned as
an organization and an alliance hub simultaneously, it propagated the view that the United States was the
primary threat to prospective allies.

However, few fellow Sunni terrorist organizations shared this perception when al-Qaida developed into an
alliance hub, as most focused on nationalist causes and the threat posed by their respective governments.
[63] Like al-Qaida, they opposed the United States and the world order under its hegemony, but the United
States was not the primary threat, or in some cases, a direct threat at all. For example, the Egyptian Islamic
Jihad and Egyptian Islamic Group saw Cairo as their greatest threat.[64] Likewise, the Algeria Armed Islamic
Group faced a clear threat from Algiers, a conflict in which the United States played a minimal role and thus
posed no threat.[65] Yet all three groups allied with al-Qaida in the early 1990s, helping to elevate it into an
alliance hub.[66] Therefore, al-Qaida developed into an alliance hub during a period in which most of its
allies did not share its threat perception.[67]

Moreover, it cooperated only temporarily with groups that shared its perception of the threat from the United
States during the early 1990s, to include Somali warlord Mohamed Farah Aideed and Hezbollah, but did not
forge full alliances with these actors.[68] Threat cannot explain this failure to ally or the short duration of
their cooperation. More importantly, if threat motivated al-Qaida to become an alliance hub and attracted
partners, its coalition would have included these groups, which shared its threat perception. Instead, its
alliance network predominantly included fellow Sunni jihadist groups with differing threat perceptions.

In addition, 9/11 and the United States response to it precipitated a convergence of threat against terrorist
organizations to a degree previously unseen. Al-Qaida essentially created a situation whereby the United
States posed the threat to terrorist groups, particularly to Sunni terrorist organizations, that al-Qaida long
claimed that it did. Yet al-Qaidas alliance position did not commensurately change following this significant
threat escalation. For example, immediately following the U.S. invasion of Afghanistana clear shared threat
for all resident groupsboth the Libyan Islamic Fighting Group (LIFG) and Jund al-Sham declined to ally
with al-Qaida. A few years later, Jund al-Sham agreed to ally with al-Qaida and became al-Qaida in Iraq, now
known as ISIS and a faction of LIFG merged with al-Qaida.[69] But in the face of a clear shared threat to
both groups in Afghanistan, they opted to flee rather than ally with al-Qaida, contrary to what threat-based
theories would predict. Post-9/11, al-Qaida added a different type of alliancethe affiliatesbut this did not
flow from a change in threat. As will be explained below, this reflected the shift in the assets al-Qaida could
provide its partners.

Threats limited explanatory power becomes even more apparent when examining the PFLP case. Israel posed
the greatest threat to the PFLP throughout its time as an alliance hub, yet none of the PFLPs international
allies faced any direct threat from Israel. Many opposed Israel on ideological grounds, but did not actually
experience a threat from it, let alone view it as their greatest threat. Only the PFLPs competitors shared this
threat and, as discussed earlier, different dynamics governed their alliance behavior. While the PFLP and its
international allies shared a perception that the imperialist international system was an underlying cause

ISSN 2334-3745 12 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

of their respective threats, numerous organizations that did not ally with the PFLP also held this view. Thus,
threat provides minimal insight into the PFLPs ability to develop into or operate as an international alliance
hub.

One problem with the threat-based theory is terrorist groups constantly view themselves as threatened by
implacable foes. Yet alliance hubs remain rare, as do alliances. In other words, theories of shared threat
over predicts the frequency of alliance hubs and international terrorist alliances in general. Similarly, as
discussed, both alliance hubs opposed the international system and viewed it as threatening. But this did not
differentiate them from most groups operating during their respective eras. Many terrorist groups focus on
parochial threats, but they also often see the international system as partially culpable for their grievances.
Moreover, the international system configuration does not frequently change and thus the threats posed by
it to terrorist groups fail to explain the timing or duration of alliance hubs, including the termination of the
PFLPs alliance hub position in 1979, or their relationships.

Ideology: Causing Alliances or Shaping Alliance Behavior?


In addition to threat, shared ideology is also frequently invoked in explanations of terrorist group alliance
behavior, with good reason. Quantitative research established that organizations with a shared ideology
tend to ally, regardless of ideological orientation.[70] In addition, terrorist groups frequently attribute their
alliance behavior to their ideological convictions. To return to the GSPC example, when asked why the GSPC
decided to ally with al-Qaida, the GSPCs leader responded that: [w]e rely on legitimacy (from religion)
before anything else as a base of our decisions.[71]

Ideology serves as a lens through which groups view and interpret their environment and is what separates
terrorist groups from profit-motivated criminals and other illicit non-state actors.[72] Terrorism expert
Daniel Byman described the role of ideology as explaining the worlds conditions and offering a blueprint for
action. Ideology helps individuals formulate, consider and respond to political problems.[73] In her analysis
of left-wing terrorism in Italy, Donatella della Porta similarly found that [i]deologies operate as facilitating
factors, resources or constraints in the formation of actors and in their definition of strategies.[74] However,
the way in which ideology would theoretically function to produce alliances, let alone alliance hubs, remains
unclear. No comprehensive theory exists that clearly specifies how ideological solidarity or compatibility
causes terrorist alliances, despite the widespread perception that ideology influences terrorist group alliance
behavior.

Like the contention that shared threats produce alliance hubs, the inchoate idea that common ideologies
produces alliances or hubs faces a number of shortcomings. First, it suggests that alliance hubs should occur
far more frequently than they do, as groups often share ideologies, while alliance hubs and alliance writ
large remain rare. Like threat, ideological solidarity predicts that alliance hubs should form where they do
not exist. Neither can account for the variation in cooperation among different dyads that share comparable
levels of common threats or ideological solidarity. Threats and ideology do not often shift significantly during
most groups lifespan, so they cannot readily explain alliances or hubs timing or duration. Overall, existing
theories and conventional wisdom struggle to explain alliances and alliance hubs.

Ideology functions as an integral feature of terrorist groups identities and thereby shapes alliance behavior.
As constructivist scholar Michael Barnett argued, a natural security partner cannot be derived from
material forces alone, for the degree of naturalness is highly dependent on familiarity and identity.[75]
Instead of functioning in the primary causal role that terrorist groups like the GSPC attribute to it, ideology
operates as part of identity criteria that guide partner selection and contribute to alliance hubs appeal as

ISSN 2334-3745 13 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

partners. For terrorist organizations in particular, identity ensures organizational loyalty and cohesion.
Identity refers to the understanding of oneself in relationship to others.[76] Collective identity consists
of both an internal and an external component; it binds terrorist groups together and situates them with
respect to others. Collective identity provides a set of norms and narratives that sustain we-ness through
time.[77] It functions as the glue binding terrorist groups together.[78]

Identity affinity guides partner preferences and delineates the boundaries of acceptable alliance partners.
[79] Affinity refers to a sense of mutual identification among groups based on shared identity traits. Groups
use identity affinity to evaluate the worthiness and desirability of prospective partners. Identity conditions
thinking such that a group seeking an alliance will limit its search to other organizations with which it shares
identity traits, primarily ideology, but potentially other identity characteristics, such as enemy narrative or
ethnic affinity as well. Groups weigh affinity, either consciously or unconsciously, when they are deciding
whether to enter into an alliance. In essence, in order to enter into a partnership, prospective allies must
satisfy an identity threshold.

This identity threshold facilitated both alliance hubs positions because they possessed salient identity
features in their respective eras, and thus numerous other groups viewed them as acceptable partners. In
particular, they adhered to ideologies that defined the terrorist landscape during their time. During the
PFLPs tenure as an alliance hub, fellow militant leftist organizations were active in every hemisphere,
identified as the third wave of modern terrorism by David Rapoport.[80] For its part, al-Qaida emerged from
the broader Islamist revival and the militant Sunni offshoots of that movement, particularly following the
anti-Soviet jihad in the 1980s. Thus, they had numerous ideological brethren, accepted many as partners, and
conversely, these groups tended to view them as suitable allies.

While terrorist groups identities consist of more than just their ideologies, al-Qaida and the PFLP both used
ideology as their primary criteria to determine identity affinity. This is consistent with terrorist groups use
of their ideology to reduce the information required to act and to simplify the environment.[81] Ideology
serves as an integral component of terrorist groups identity features in that it provides both the historical
narrative and vision that binds terrorist organizations together.[82] An ideological platform helps to readily
divide the world into dichotomous categories of us versus them. These binary categories reinforce in-
group solidarity and identities.[83] They also inform friend-enemy distinctions, including determinations of
who is a potential ally and who is an unacceptable partner.[84] However, ideology alone was not sufficient to
produce an alliance, as both hubs also failed to ally with groups with which they shared ideologies, including
some of their closest ideological brethren.

Each terrorist group defines its identity parameters for alliances, including the degree of ideological
compatibility necessary to meet the identity threshold. Ideologies do not come neatly pre-packaged to fit all
circumstances. Instead, groups act as the interpreter and filter of their ideologies and adapt them to their
conditions.[85] The resulting identity affinity parameters depend on groups ideological disposition, their
ideological flexibility or rigidity, and the overall ideological landscape.

Both alliance hubs defined their identity parameters broadly enough to include numerous potential
partnersa perk of their adherence to an ideology with resonance in their environmentbut narrowly
enough to maintain a cohesive in-group identity among its allies. Al-Qaida defined ideological affinity
as fellow Sunni jihadist groups.[86] Thus, its affinity criteria expanded beyond its narrower Salafist sect
to include Deobandi groups, but excluded non-Sunni Muslim groups, such as Shia, Sufis or Barelvi
organizations or Sunni entities that eschewed violence in favor of political participation. For example, al-
Qaidas cooperation with Hezbollah early in its organizational life proved short-lived in part because it

ISSN 2334-3745 14 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

strained its identity affinity parameters.[87] Some contend that Marxist actors struggle to form alliances.[88]
Yet the PFLPa group admittedly more tinged with red than doctrinaire in its adherence to Marxism
defined its identity parameters expansively to include most fellow leftist groups and successfully forged
numerous allies.[89] It also had an ethno-nationalist streak that provided a basis for affinity with other
groups seeking self-determination, though its leftist affinity proved far stronger.[90]

Al-Qaida and the PFLP also propagated expansive enemy narratives. All terrorist groups construct narratives
that identify their enemies and the victims. Groups enemy and victim narratives explain why the enemy is
the enemy and the plight of the victims they purport to represent. A terrorist group can describe its enemy
in different terms at various times in order for its narrative to remain relevant with the perceived disposition
of its constituencies.[91] Significant overlap in groups narratives creates a sense of identity affinity between
groups. When a common enemy/victim construction exists, a corresponding sense of them as opposed to
us can also be present. This can complement ideological affinity or operate alone. In the hub case studies,
narrative affinity buttressed ideological affinity. Al-Qaidas opposition to the United States, Israel, their allies,
as well as so-called apostate regimes provided numerous avenues for narrative affinity with fellow Sunni
jihadist groups. Likewise, the PFLP held the imperial system responsible for Israels perpetuation and the
Palestinians plight, thus its narrative included opposition to any states considered part of the United States-
led imperialist bloc.[92] The international orientation of their narratives added to a sense of identity affinity
with many of their ideological brethren. Thus, the materiel interests derived from having a common enemy
do not stimulate hubs; instead, hubs have expansive enemy or victimization narratives that overlap with
others narrative and thereby make them acceptable partners to them.

Lastly, identity affinity serves as a cue that it is safe to attempt to build trust. In intra-conflict relations,
identity affinity narratives have limited staying power and groups often have histories of interactions that
make trust untenable. However, in the international environments where information is more limited,
identity affinity signals trustworthiness. Alliances do not work without trust, and yet it is exceptionally
difficult for terrorist groups to develop it. Identity affinity acts as an early indicator to prospective partners
operating in the international realm that it is safe to try to build trust, especially when personal ties have not
yet formed or reputations are not well established. Trust is essential for alliances to form and sustain; alliance
hubs must be seen as trustworthy by their partners and vice versa. Their identity characteristics help to
cultivate trust. Identity affinity cannot substitute for trust, yet without it, prospective allies are less apt to seize
opportunities to build trust.

Organizational Needs
Identity affinity helps to explain alliance hubs appeal; it does not explain why hubs become alliance magnets.
While pursuing political aims, terrorist groups, like other organizations, seek their own survival and
organizational well-being, which they see as integral to achieving their goals. To survive and thrive, they
must possess the organizational knowledge, skills, and assets appropriate in their operating environment.
When organizational learning needs and adaptation requirements arise that cannot be addressed through self
reform, groups alliance searches will lead them to alliance hubs, in particular hubs that meet their identity
affinity parameters. In short, alliance hubs emerge as desirable partners because they are both well positioned
and willing to fill other groups organizational learning and adaptation needs.

Terrorist groups negotiate a constant organizational tension: a bias towards action and a need to secure their
survival.[93] When violence becomes necessary for internal satisfaction, a groups activities can become
less connected to their political aims and more about affirming the organizations viability to satisfy existing

ISSN 2334-3745 15 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

members and draw in new ones.[94] Essentially, the means by which the group seeks to achieve political
change, i.e. terrorism, and the perpetuation of the group become ends onto themselves, irrespective of
their actual efficacy in achieving broader strategic aims.[95] As a result, over time, the need to preserve the
group gradually determines many decisions.[96] This helps to explain why some groups persist even after
many of their goals have ostensibly been accomplished or when their demands are no longer relevant to the
environment.[97]

The perpetuation of the group depends in part on the adequacy of its knowledge base. Terrorist groups
knowledge base is the product of their organizational learning and adaptation processes. Organizational
learning refers to groups acquisition of new knowledge and skills to apply to future actions and decisions.
[98] Relatedly, organizational adaption involves groups adjusting their existing knowledge, understandings,
and processes to changed circumstances.[99] This knowledge base includes everything from their
philosophical understanding of the problems that gave rise to their existence to the tactical requirements for
day-to-day operations.[100]

Terrorist groups must continually question, verify, and re-define how their knowledge base interacts with
their environments. Organizations misaligned with their environments experience instability, decline,
and even death.[101] Conversely, groups appropriately aligned with their environment function more
competitively, effectively, and innovatively.[102] Therefore, terrorist organizations must constantly learn,
anticipate, and adapt in order to endure and prosper. Discrepancies between a groups knowledge, skills or
resource base and its environment generate organizational learning and adaptation needs.

When organizational learning or adaptation needs become acute or significant, groups have a choice whether
to: 1) continue without addressing the shortfall; 2) undertake self-reform; or 3) seek an alliance. The first
option will lead to decline, potentially even an organizations demise, if the deficiencies become substantial
enough. Most groups should prefer self-reform, given the risks involved in an alliance, but this may not
be possible or successful, depending on the need, their existing knowledge base, and the environment. If a
group both recognizes and chooses to address the need, but remains unable or unwilling to undertake self-
reform, it may look for an ally. Therefore, groups seek alliances with hubs when hubs can provide access to
the knowledge, resources or assets others need to remain competitive in the prevailing and the anticipated
conditions.[103] In other words, hubs acquire their position by addressing other groups organizational
learning needs and adaption requirements.

Indeed, al-Qaida and the PFLP both possessed extensive resources and knowledge bases that they used
to address other groups organizational learning and adaptation needs. In the PFLP case, upon closer
examination, it becomes clear that the PFLPs alliance hub activities were concentrated in its international
terrorist wing, the PFLP-SOG. For much of al-Qaidas tenure and all of the PFLP-SOGs time as a hub,
they offered valuable assets to other terrorist groups, including training, safe haven, logistical assistance,
and operational guidance, not to mention money and materiel. How did they acquire this ability? Part of
it stemmed from the freedom afforded by their permissive state sponsors. These sponsors did not act as
third-party arbiters or enforcers, but they offered both hubs sanctuary as well as extensive latitude within
that haven, which was critical because al-Qaida and the PFLP-SOG both operated in exile. The PFLP-SOG
ran training facilities from its haven in South Yemen and to a lesser extent in Lebanon, as did al-Qaida
in its sanctuaries in Sudan and Afghanistan. Thus, in the wake of losses, such as when the Red Army
in Japan sought training and revolutionary experience and the RAF needed training in hostage-taking
operations, they sought an alliance with the PFLP-SOG.[104] Both hubs also extended their safe haven to
allied groups when their partners needed breathing room. In addition, both groups enjoyed substantial
treasuries, al-Qaidas derived in large part from Usama bin Ladens wealth and the PFLP-SOGs from its

ISSN 2334-3745 16 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

blackmail, hijacking and hostage-taking operations.[105] They each had transnational reach with supporters
in numerous countries, which they used to help partners with facilitation or logistics needs. Both hubs
possessed operational sophistication and thus could provide guidance to partners on how to conduct attacks.
Overall, both hubs could fulfill an array of tangible organizational learning and adaptation needs for other
groups.

In addition, allying with the PFLP-SOG and al-Qaida also conferred cachet upon their partners, an intangible
asset coveted by groups struggling to maintain relevance or support. As part of the Palestinian cause
revered in the late 1960s and 1970s as a premier revolutionary liberation struggleworking with the PFLP-
SOG bestowed prestige on partners.[106] Al-Qaidas transnational agenda offered fellow Sunni terrorist
groups with declining resonance another cause to pursue in order to survive, a particularly valuable asset in
the late 1990s following the defeat of many nationalist jihadist groups.[107] This intangible benefit expanded
the pool of groups that could fulfill their organizational needs through allying with these hubs.

The two hubs operational capability also improved their alliance appeal. The PFLP-SOGs high profile and
innovative hijacking attacks, which ushered in the international era of terrorism, advertised a sophisticated
operational capability that attracted allies.[108] Shortly after al-Qaidas name became synonymous with
the largest terrorist attack in history, it lost many of the assets that made it an alliance hub, such as training
facilities and haven. Thus, it no longer attracted partners that sought to fulfill those needs. Instead, groups
seeking to associate with al-Qaidas image, cause, and capability, such as the GSPC, gravitated to al-Qaida and
adopted its moniker.

But why would groups use their assets to fulfill other groups needs? Hubs expend resources that they could
use internally. Even sharing intangible assets imposes costs on hubs and can damage their reputations.
[109] The two hubs shared an international orientation to their ideologies, narratives, and opposition to
the international order, albeit based in different ideologies. More importantly, their alliance posture largely
derived from perpetual organizational needs that stemmed from that disposition. Al-Qaidas motives
evolved over time. Al-Qaidas well-known organizational desire to be the vanguard of an international Sunni
jihadist movement in part motivated its early alliance receptivity, as it used alliances to bring groups under
its rubric and guide their activities. The gap between its resources, its political and organizational goals, and
its environment created a perpetual organizational deficiency that motivated its hub activities.[110] In the
changed environment post-9/11, al-Qaida used alliances as a way to signal its continued viability in the face
of constant losses and, in a reversal of fortunes, also needed allies to find haven and protection.

For the PFLP-SOG, allies played an integral role in the small, covert units ability to execute transnational
attacks, its sole mission. Unable to strike in Israel, the group viewed international attacks as the only way
to punish those it viewed as responsible for the Palestinians plight. As it grew more difficult for its Arab
operatives to conduct operations, allied operatives helped the hub evade enhanced security measures.[111]
In addition, its allies visible role in its attacks signaled that the Palestinian cause had international support
that extended beyond the Arab world and garnered extensive media attention.[112] In the wake of the French
withdrawal from Algeria, Palestinian militant groups became convinced that such international attention
was essential to victory.[113] Moreover, the PFLP-SOGs motive was not selfless; it charged trainees to come
to its camps and when it assisted with operational plans involving hostages and demands, it required a cut
of the ransom money.[114] In other words, allies fulfilled the perpetual organizational needs of a small unit
executing a transnational campaign from exile.

In sum, hubs acquire their positions by possessing knowledge, skills, and assets in demand to address others
organizational needs in the prevailing conditions and a willingness to share these with those groups that

ISSN 2334-3745 17 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

met its ideological affinity criteria because of their own perpetual organizational needs. When groups seek
an ally to fulfill their organizational needs, this search tends to lead to hubs with shared identity traits. Over
time, hubs become magnets for partners with shared identity qualities when organizational needs arise. Hubs
choose to adopt this position because they possess ongoing organizational needs that require alliances as well
and adhere to ideologies or narrative that prescribe or at least support working with their identity brethren.

Follow On Research and Implications


On July 10 2014, a Pakistani terrorist group calling itself Tehreek-e-Khilafat declared fidelity to ISISs leader,
Abu Bakr al-Baghdadi.[115] The gesture by the shadowy and relatively unknown Pakistani group raises the
question: will ISIS emerge as an alliance hub in its own right, particularly as al-Qaidas alliance hub position
weakens? Al-Qaidas remaining asset, its name, has continued to lose its cachet, and even al-Qaida leaders
have contemplated a name change.[116] In the absence of an international alliance hub, alliances within the
Sunni jihadist movement may devolve into alliances linked through regional alliance hubs. Groups like the
GSPC/AQIM have the ability and willingness to provide mobile training and haven at that level, as it has
reportedly done for Boko Haram and other local jihadist elements.[117] Or another international alliance
hub may emerge, such as ISIS, if it is willing and acquires sufficient operating space or status to address other
groups organizational needs.

Subsequent research supports these findings on alliance hubs. Two brief examples help to illustrate. First,
Lashkar-e-Tayyiba (LT)a group with sufficient organizational capability to become an alliance hubhas
opted not to adopt this role because it lacks the requisite organizational needs that motivated the PFLP-SOG
and al-Qaidas willingness. The Pakistani Sunni terrorist group operates numerous training facilities from
its extensive haven in Pakistan, where it enjoys the long-standing tutelage of the Pakistani Army. While it
has trained foreigners in its camps and has a smattering of allies, it has not adopted an alliance hub position
because its organizational knowledge base remains well aligned with its environment; thus, it lacks ongoing
organizational needs for allies to address. It primarily conducts operations in India and Afghanistan, though
it has sought plausible deniability to these attacks in recent years.[118] For example, one of its allies, Indian
Mujahidin, fills an important organizational adaptation need: access to India for operations and a veneer or
deniability.[119] So it does not eschew alliances altogether, but its organizational needs remain insufficient
for it to invest its resources in becoming a hub. In other words, LT has the capability, but not the desire to
become a hub. Should this change, LT may have the potential to function as a regional or potentially even
international alliance hub.

Second, the West German leftist group, the RAF endeavored to become an alliance hub in the 1980s. It
appealed to numerous fellow European leftist groups, including the French Direct Action (AD), the Belgium
Communist Combatant Cells (CCC), and the Italian Red Brigades, in an effort to become a regional hub. The
RAFs efforts produced brief alliances with these groups, first AD and CCC and later, the Red Brigades. But
all proved unstable and short-lived.[120] Soon thereafter, its Euro-terrorist coalition collapsed. The RAFs
alliance hub efforts relied on ideological affinity to court partners, but its prospective allies faced periods of
weakness and declining relevancy. They needed an alliance hub that could help them adapt because in the
changing environment, leftist groups were quickly becoming hopeless anachronisms.[121] But the RAF
did not possess the requisite assets that could realign these groups with the changing environment. In other
words, the RAF had the desire; however, it lacked the resources to fulfill the pressing organizational needs of
its partners. As a result, its alliance hub effort soon faded out.

Although international terrorist alliances pose a clear threat, to date no country has developed or executed

ISSN 2334-3745 18 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

a clear and effective policy to disrupt them. While no silver bullet will eradicate alliance hubs, this research
highlights the reality that terrorist groups seek them as partners because of organizational weakness, often
when they cannot undertake self-reform. Hubs increase the threat because they help fellow terrorist groups
to fill organizational needs that, left unaddressed, would cause their decline and possibly even demise.

Therefore, counterterrorism policies should focus on degrading the assets that attract groups and disrupting
their service provision capacity. Al-Qaida and the PFLP-SOG depended on unfettered safe havens to offer
their partners resources like training, consultation, and sanctuary as well as to provide a venue to build trust.
Targeting safe havens in particular will help prevent the emergence of alliance hubs and reduce the efficacy
of existing ones. The hubs quasi-state characteristics, including their havens, depended on supportive
governments, and this offers yet another reason to sanction and punish state sponsors, particularly those
that support alliance hubs. Even after al-Qaida lost its state sponsors and sanctuaries, the foundation Sudan
and Afghanistan provided helped al-Qaida to sustain its position for years. In addition, both al-Qaida and
the PFLP-SOG benefitted from reputations as operationally sophisticated organizations, which increased
their appeal as partners. To counter this, governments should emphasize hubs operational failures and
mistakes, especially when they contribute to their partners shortcomings and missteps. Their hub positions
also depended on their robust treasuries, so measures to degrade their finances will help erode their ability
to assist other groups. More specifically, disrupting financial transactions when hubs have committed
to fulfilling partners organizational needs at critical junctures will harm relationships and damage hubs
reputations overall.

Counterterrorism efforts should also target figures within alliance hubs who manage, facilitate, and
encourage alliances. In particular, leadership decapitation may damage alliance hubs position and
functioning. While they had vastly different leadership styles and skills, from an early point, Haddad and
bin Laden saw alliances as a way to address their organizations needs, were inclined to use their resources
to assist other groups, and were involved in all aspects of their groups alliances. They embedded alliances
into their organizations problem-solving processes and cultures from the outset. In the PFLP-SOG case, the
loss of Haddad spelled the end of the groups time as an alliance hub. While bin Ladens death did not have as
decisive of an impact on al-Qaidas ability to act as an alliance hub, it further degraded al-Qaidas weakened
alliance position. Moreover, replacement leaders may not be as effective or as receptive to alliances as their
predecessorsthis has been the case with Ayman al-Zawahiri. In addition to the central role that leaders
played in hubs development and sustainment, both groups depended on key figures to act as liaisons for
partner groups. Targeting those individuals disrupts alliance interactions and can erode trust and affinity
between hubs and their partners.

Admittedly, many of these recommendations are already part of U.S. counterterrorism strategy. Therefore,
more effective alliance disruption efforts do not necessarily require new initiatives. Rather they require
more focused and enhanced measures against hubs as well as well-timed interventions. Keeping in mind
the dynamic nature of an alliance, governments can corrode alliances by putting pressure on the partnering
groups identity affinity and hubs appeal. Coordinated and consistent messaging on real or potential points of
identity fissures may pressure alliance cohesion and force hubs to limit their parameters in order to maintain
a cohesive in-group identity within the alliance cluster. Pointing to relationships, cooperation or actions
inconsistent with hubs professed identity will help erode their appeal. When governments label groups as
compatible or emphasize traits that other groups share with hubs, they inadvertently help foster a sense
of affinity and reinforce hubs positions. Instead, governments should emphasize ideological differences,
conflicts in groups narratives, and cultural differences that differentiate a hub from its partners. In particular,
highlighting actions that constitute violations of their shared identities can help weaken alliances.

ISSN 2334-3745 19 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

In addition, government interventions that foster the impression that cooperation failed due to the hubs
inability or unwillingness to fulfill other groups needs will damage the hubs desirability and stunt individual
relationships. Alliance hubs relationships tend to be particularly vulnerable during the early, trust-building
phase. Therefore, early interventions that cause cooperation failures will signal to the prospective allies that
the hub cannot fulfill needs. Propaganda efforts that cast doubt on a hubs ability to address organizational
needssuch as training that did not prepare a partner for an operation or contributed to an operational
failurewill also diminish their appeal.

In general, counterterrorism efforts to prevent and disrupt alliances should capitalize on the obstacles
groups already face when they attempt to ally. Governments can focus on undertaking measures that both
increase the costs of alliances and stoke the concerns that hinder them. Rather than emphasizing groups
commonalities, messaging in forums where the groups acquire information should highlight allying groups
differences and the risks that alliances pose. For example, given terrorist organizations difficulties forging
credible commitments, governments should highlight instances when hubs fail to honor promises or attempt
to use cooperation opportunistically. In addition, because alliances sometimes sow internal divisions,
governments can take advantage of this by emphasizing the ways alliances cause partnering groups to deviate
from their primary goals and lose their autonomy. Opportunities also exist to damage ties by pointing out
when groups actions alienate their partners constituents. Counterterrorism policies that treat alliances
as static or prematurely label a relationship as an alliance inadvertently reduce the costs incurred by the
partnering groups, as concerns about an increase in counterterrorism pressure can help deter alliances.
Conversely, once an alliance occurs, affected governments should work together to increase the pressure
on both groups, including through measures such as sanctions. More than any other obstacle, stoking fears
about infiltration and betrayal has the potential to damage alliance hubs appeal and disrupt specific alliances.
In other words, each of the obstacles that alliances face offer exploitation opportunities for governments.

These findings are significant because the conventional (albeit underdeveloped) wisdom that ideology
and enemies precipitate terrorist alliances suggests that government intervention will be ineffective.
Governments cannot often change terrorist groups ideology or enemies. Moreover, the notion that shared
threats cause alliance hubs infers that governments cooperation against terrorist groups will cause them
to unite in response, creating a disincentive to build counterterrorism coalitions. However, understanding
that an organizations willingness and ability to fulfill others needs makes them an attractive partner offers
unexplored avenues to prevent and disrupt these dangerous relationships. It also can help governments to
identify when alliances are more apt to occur, specifically when groups experience and identify acute or
significant organizational needs that they cannot address on their own. Therefore, the United States can
devise a better strategy to prevent hubs emergence and diminish their effectiveness when they do occur.
This strategy should focus on the role of organizational needs and identity in alliance behavior as well as
exploiting the obstacles that hinder all alliance efforts.

About the Author: Tricia Bacon, Ph.D. is a Professorial Lecturer at American Universitys School of Public Af-
fairs. Prior to her employment at American University, Dr. Bacon worked on counterterrorism for over ten years
at the Department of State, including in the Bureau of Intelligence and Research, the Bureau of Counterterror-
ism, and the Bureau of Diplomatic Security. She earned her Ph.D. at Georgetown University in 2013 under the
direction of Dr. Daniel Byman, Dr. Bruce Hoffman, and Dr. Robert Lieber.

ISSN 2334-3745 20 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Notes
[1] Migdalovitz, Carol. Algeria in Crisis: Situation Update. Washington, D.C.: Congressional Research Service, Library of Congress, 1994; Migdalovitz, Carol.

Algeria: Current Issues. Washington, D.C.: Congressional Research Service, Library of Congress, 21 Jan. 2011; Hunt, Emily. Counter-terrorism Successes Force

Algerian Militants to Evolve. Janes Intelligence Review 18 May 2006: 14; Hunt, Emily. Islamist Terrorism in Northwestern Africa: A Thorn in the Neck of the United

States? Washington: Washington Institute for Near East Policy, 2007; Kohlmann, Evan. Two Decades of Jihad in Algeria: the GIA, the GSPC, and Al-Qaida. The

NEFA Foundation May 2007. Web. 13 Jan. 2013. Filiu, Jean-Pierre. The Local and Global Jihad of al-Qaida in the Islamic Maghrib. Middle East Journal 63.2

(Spring 2009): 213-226.

[2] Mekhennet, Souad, Michael Moss, Eric Schmitt, Elaine Sciolino, and Margot Williams. A Ragtag Insurgency Gains a Qaeda Lifeline. The New York Times. n.p. 7

June 2012. Web.

[3] Incident Summary for GTDID 200704110001. Global Terrorism Database. University of Maryland, 11 Apr. 2007. Web; United States. Department of State. 2006

Country Reports on Terrorism (Washington: Government Printing Office, 2007). 7, 302; Incident Summary for GTDID 200703030002. Global Terrorism Database.

University of Maryland, 3 Mar. 2007. Web; Incident Summary for GTDID 200712110010. Global Terrorism Database. University of Maryland, 11 Dec. 2007. Web.

8; quoted in: Kohlmann. Two Decades of Jihad in Algeria. 13 Jan. 2013.

[4] An Interview with Abdelmalek Droukdal. New York Times Online 1 Jul. 2008: n.p. Web; United States. Dept. of State. 2006 Country Reports on Terrorism. 105-6;

Weaver, Matthew. British Hostage Edwin Dyer Killed by al-Qaida. The Guardian, 3 Jun. 2009: n.p. Web; Filiu, Jean-Pierre. Could Al-Qaeda Turn African in the

Sahel? (Washington: Carnegie Endowment for International Peace, 2010).

[5] Mekhennet et al. A Ragtag Insurgency.

[6] Cragin, Kim, Peter Chalk, Sara A. Daly, and Brian A. Jackson. Sharing the Dragons Teeth: Terrorist Groups and the Exchange of New Technologies. Santa Monica:

RAND Corp, 2007.

[7] Asal, Victor and R. Karl Rethemeyer, The Nature of the Beast: Organizational Structures and the Lethality of Terrorist Attacks, The Journal of Politics 3, no. 2

(2008): 445. Oots, Kent Layne. A Political Organization Approach to Transnational Terrorism. New York: Greenwood Press, 1986; 92.

[8] Price, Bryan. Targeting Top Terrorists: How Leadership Decapitation Contributes to Counterterrorism. International Security 36 (2012): 9-46.

[9] Mickolus, E. F., Combatting International Terrorism: A Quantitative Analysis. (Unpublished Dissertation, Yale University, New Haven, CT 1986); Oots. A Political

Organization Approach 41; Asal, Victor, Hyun Hee Park, Karl Rethemeyer, and Gary Ackerman, With Friends Like These, 2010 American Political Science

Association Conference, 14.

[10] Asal et al, With Friends Like These., 14.

[11] Oots. A Political Organization Approach, 41; Bapat, Navin A, and Kanisha D. Bond. Alliances Between Militant Groups. British Journal of Political Science, 42.4

(2012): 793-824; Bond, Kanisha. Power, Identity, Credibility & Cooperation: Examining the Development of Cooperative Arrangement among Violent Non-State

Actors. (Diss. University of Maryland, 2010), 820.

[12] Crenshaw, Martha. Theories of Terrorism: Instrumental and Organizational Approaches. Journal of Strategic Studies 10.4 (1987), 13-31.

[13] Asal, Victor, Hyun Hee Park, and Karl Rethemeyer. Terrorist Networks Over Time. Theory vs. Policy? Connecting Scholars and Practitioners. International

Studies Association Conference. Conference Presentation, 31; Oots. A Political Organization Approach, 114.

[14] United States District Court Southern District of New York v. Usama Bin Laden et. al Defendants.: S(7)98 Cr. 1023. Department of Justice. New York. 6 Feb.

2001; Kaplan, Eben. The Al-Qaeda-Hezbollah Relationship. Council on Foreign Relations Backgrounder Aug. 2006: n. p. Web. 23 Jul. 2012; Alexander, Yonah,

and Dennis A. Pluchinsky. European Terrorism Today and Tomorrow (Washington: Brasseys Terrorism Library, 1992), 67; Cragin et al. Sharing the Dragons Teeth;

An Interview with Abdelmalek Droukdal.; Open Source Center, Fatwa Urging Jihad Against Americans, Translation of a Usama bin Laden speech, Declassified

Information Report, Digital National Security Archive, Feb. 1998.

[15] Asal et al. Terrorist Networks Over Time.

[16] United States. Central Intelligence Agency. National Strategy for Combating Terrorism. Digital National Security Archive. Feb. 2003.

[17] Bacon, Tricia. The Foreign Policy Essay: ISISs Rejection of Al QaedaThe End of an Era? http://www.lawfareblog.com/author/tricia-bacon/ Accessed

7/11/2014.

ISSN 2334-3745 21 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

[18] Ole Holsti, P. Terrence Hopmann, and John Sullivan, Unity and Disintegration in International Alliances: Comparative Studies (New York: John Wiley & Sons,

Inc., 1973), 2.

[19] Schmid, Alex P. and Albert J. Jongman. Political Terrorism: A New Guide to Actors, Authors, Concepts, Data Bases, Theories, and Literature (New Brunswick:

Transaction Books, 1988), 5.

[20] Hoffman, Bruce. Inside Terrorism (New York: Columbia UP, 2006), 40.

[21] Holsti et al, Unity and Disintegration in International Alliances. 2; Walt, Stephen. The Origins of Alliances (Ithaca: Cornell Press, 1987), 12; Barnett, Michael and

Jack S. Levy, Domestic Sources of Alliances and Alignments: The Case of Egypt, 1962-73, International Organization 45. 3 (1991): 370; Christia, Fontini. Alliance

Formation in Civil Wars (New York: Cambridge UP, 2012), 11.

[22] Pedahzur, Ami, Leonard Weinberg and William Eubank, The Characteristics and Connections of Terrorist Organizations. 2002 APSA Conference. Hoffman.

Inside Terrorism, 63-80.

[23] McCormick, Gordon. Terrorist Decision-Making Annual Review of Political Science 6 (2003): 473507.

[24] Hoffman, Bruce. The Logic of Suicide Terrorism. The Atlantic Monthly 291.5 (2003), 1-10.

[25] Bloom, Mia. Dying to Kill: The Allure of Suicide Terror. New York: Columbia UP, 2005.

(61); Kydd, Andrew and Barbara Walter. The Strategies of Terrorism. International Security 31, no.1 (2006), 49-80 at 77.

[26] Christia. Alliance Formation in Civil Wars, 19-32.

[27] Russett, Bruce. Components of an Operational Theory of International Alliance Formation. Alliances in International Politics. Eds. Julian Friedman,

Christopher Bladen and Steven Rosen (Boston: Allyn and Bacon, 1970), 238-241. Christia. Alliance Formation in Civil Wars, 32-3.

[28] Christia. Alliance Formation in Civil Wars,. 45-49.

[29] Groups that opt to participate in a conflict other than their primary or founding conflict typically do not become competitors with parties within that third

conflict as long as they still acquire resources from a different political market than the groups that are indigenous to the conflict.

[30] See for example: Bond, Kanisha. Power, Identity, Credibility & Cooperation: Examining the Development of Cooperative Arrangement among Violent Non-

State Actors. Diss. University of Maryland, 2010; Bapat and Bond. Alliances Between Militant Groups, 793-824; Asal and Rethmeyer. The Nature of the Beast,

437449.

[31] Russett, Bruce. Components of an Operational Theory of International Alliance Formation, 286.

[32] Bapat and Bond. Alliances Between Militant Groups, 811.

[33] Dugan, Laura. 2012. The Making of the Global Terrorism Database and Its Applicability to Studying the Life Cycles of Terrorist Organisations, in D. Gadd, S.

Karstedt, and S. Farrall (Eds.) Sage Handbook of Criminological Research Methods. Newbury Park, CA: Sage Publications.

[34] Bapat and Bond. Alliances Between Militant Groups, 821.

[35] Bapat and Bond. Alliances Between Militant Groups, 800.

[36] Examples of this include the internal dissension within Egyptian Islamic Jihad and Egyptian Islamic Group over whether to ally with al-Qaida. Al-Qaidas

Southeast Asian ally, Jemaah Islamiyah, was also intent on protecting its autonomy. Two JI members analogized JIs dynamic with al-Qaida, highlighting JIs

independence. One likened it to: that of an NGO with a funding agency. The NGO exists as a completely independent organisation, but submits proposals to

the donor and gets a grant when the proposal is accepted. The donor only funds projects that are in line with its own programs. In this case, al-Qaeda may help

fund specific JI programs but it neither directs nor controls it. (International Crisis Group. Indonesia Backgrounder: How the Jemaah Islamiyah Terrorist Network

Operates, Jakarta/Brussels: International Crisis Group, 2002, 30.

Another JI member involved in liaising between the two groups invoked a similar comparison, describing JI as a business affiliate, we can ask them (i.e., al-Qaida)

for an opinion but they have no authority over us. We are free. We have our own funds, our own men. We are independent, like Australia and the U.S. But when it

comes to an operation we can join together (Rassler, Don, and Vahid Brown. The Haqqani Nexus and the Evolution of al-Qaida. West Point: Combating Terrorism

Center, 2011.13 Jan. 2013).

[37] Harmony Document SOCOM-2012-0000005. (West Point: Combating Terrorism Center, 6 Aug. 2010), 1-2.

ISSN 2334-3745 22 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

[38] A good example of this was the Palestinian Liberation Organization and Irish Republican Armys denunciation of the Italian Red Brigades assassination of

Aldo Moro at a time when they sought greater international legitimacy. (Alexander and Pluchinsky. European Terrorism Today and Tomorrow. 165-166).

[39] Cragin et al. Sharing the Dragons Teeth, 3.

[40] Cragin et al. Sharing the Dragons Teeth, 6.

[41] Aust, Stephen. Personal Interview. Sep. 2007.

[42] Asal et al. Terrorist Networks Over Time, 114.

[43] Parkhe, Arvind. Executive Briefing: Current Issues in International Alliances. Business Horizons 43.5 (1998), 3.

[44] Horowitz, Michael. The Diffusion of Military Power: Causes and Consequences for International Politics (Princeton: Princeton UP, 2010), 59.

[45] Hoffman. Inside Terrorism, 63-80; and Sterling, Claire. The Terror Network (Berkeley: Berkeley Press, 1985), 13.

[46] Andrew, Christopher and Vasili Mitrokhin. The World Was Going Our Way: The KGB and the Battle for the Third World (New York: Basic Books, 2005), 247-9.

[47] Oots. A Political Organization Approach. 41; Bapat and Bond. Alliances Between Militant Groups, 114.

[48] Burke, Jason. Al-Qaeda: The True Story of Radical Islam (London: I.B. Tauris, 2004), 16.

[49] Gerring, John. Case Study Research: Principles and Practices (New York: Cambridge UP, 2007), 105.

[50] See: Moghadam, Assaf and Brian Fishman, (Eds.) Self Inflicted Wounds: Debates and Divisions Within al-Qaidas and its Periphery. (West Point: Combating

Terrorism Center, 2010); Gerges, Fawaz. The Far Enemy: Why Jihad Went Global (New York: Cambridge UP), 2005; Brown, Vahid. Cracks in the Foundation

Combating Terrorism Center at West Point. (Combating Terrorism Center at West Point); Schanzer, Jonathan. Al-Qaedas Armies: Middle East Affiliate Groups & The

Next Generation of Terror. (New York: Specialist Press International, 2004).

[51] George, Alexander, and Andrew Bennett. Case Studies and Theory Development in the Social Sciences (Cambridge: MIT Press, 2005), 31.

[52] Asal et al. Terrorist Networks Over Time. 31; Oots. A Political Organization Approach, 34.

[53] George and Bennett. Case Studies, 12.

[54] Some argue that al-Qaida is more than an organization; rather, it is a movement, a source of inspiration or a term that refers to terrorists who adhere to a

transnational Sunni jihadist ideology. While these arguments have merit, for many years, al-Qaida has also been an organization with a defined chain of command,

identified leaders, and members who swore fealty (Bergen, Peter. The Osama bin Laden I Know: An Oral History of al-Qaedas Leader. New York: Free Press,

2006, 100-101). This entity, often called al-Qaida Central, engaged in partnerships with other militant groups and became an alliance hub. This article thus looks

selectively at al-Qaida Central. This refers to the organizational structure subordinated to Usama bin Laden and after his death, to Dr. Ayman al-Zawahiri, primarily

based in Afghanistan and Pakistan since 1996, and includes members who adhered to their instructions and usually swore an oath of loyalty. Bin Laden himself

even acknowledged the validity of the idea of an al-Qaida Central in a 2010 letter to one of his subordinates. He wrote that [t]his term was coined in the media

to distinguish between al-Qaida in Afghanistan and Pakistan and al-Qaida in the other territories. In my opinion, there is no problem with using this term in

principle in order to clarify the intended meaning (Harmony Document SOCOM-2012-00000019; West Point: Combating Terrorism Center). Al-Qaida Central

made the decisions and implemented al-Qaidas alliances, and thus is the organizational unit relevant to this article.

[55] Sayigh, Yazid Yusuf. Armed Struggle and the Search for State: The Palestinian National Movement, 1949-1993 (New York: Oxford UP, 1997), 232; AbuKhalil,

Asad. Internal Contradictions in the PFLP: Decision Making and Policy Orientation. Middle East Journal 41.3 (1987),, 364.

[56] Cragin et al. Sharing the Dragons Teeth, 7.

[57] Walt. The Origins of Alliances, 24.

[58] Karmon, Ely. Coalitions Between Terrorist Organizations: Revolutionaries, Nationalists, and Islamists (Boston: Martinus Nijhoff, 2005), 279-285.

[59] Asal et al. Terrorist Networks Over Time. 31; Oots. A Political Organization Approach, 33.

[60] For example: Open Source Center. Fatwa Urging Jihad Against Americans. Translation of a Usama bin Laden Speech, Declassified Information Report, Digital

National Security Archive, Feb. 1998.

[61] Quoted in: Kohlmann. Two Decades of Jihad in Algeria.

ISSN 2334-3745 23 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

[62] Karmon. Coalitions Between Terrorist Organizations, 385.

[63] Moghadam and Fishman. Self Inflicted Wounds; Gerges. The Far Enemy, 150; Brown. Cracks in the Foundation.

[64] Gerges. The Far Enemy, 33.

[65] Kohlmann. Two Decades of Jihad in Algeria; Migdalovitz. Algeria in Crisis: Situation Update. 5; United States. Cong. Senate. The Battle Looms: Islam and

Politics in the Middle East. Report (Washington: Government Printing Office, 1993), 1-2; Shades of Extremism. The Economist 13 Aug. 1994: 16. The Economist

Historical Archive. Web.

[66] United States. Central Intelligence Agency. Terrorism: Usama bin Ladens Financial Support to the Egyptian al-Gamaat al-Islamiyah, as well as Algerian and

Libyan Extremists. Declassified Intelligence Report, Digital National Security Archive, 1997.

[67] Gerges. The Far Enemy. 25, 66.

[68] Watts, Clint, Jacob Shapiro, and Vahid Brown. Al-Qaidas (Mis)Adventures in the Horn of Africa (West Point: Combating Terrorism Center, 2007), 42-43;

Wright, Lawrence. The Looming Tower: Al-Qaeda and the Road to 9/11 (New York: Alfred A. Knopf, 2006), 270; United States District Court Southern District

of New York v. Usama Bin Laden et al Defendants. Indictment: s(9) 98 cr. 1023.15; United States. Central Intelligence Agency. Cooperation Among Usama bin

Ladens Islamic Army, Iran, and the NIF. Declassified Information Report, Digital National Security Archive, Jan. 1997; United States. Central Intelligence Agency.

Establishment of a Tri-partite Agreement among Usama bin Laden, Iran, and the NIF. Declassified Information Report, Digital National Security Archive, Jan.

1997.

[69] Weaver, Mary Anne. The Short, Violent Life of Abu Musab al-Zarqawi. The Atlantic Magazine 8 Jun. 2006, n. p. Web. 13 Jan. 2013; Gerges. The Far Enemy.

258; Zelin, Aaron Y., and Andrew Lebovich. Assessing Al-Qaidas Presence in the New Libya. CTC Sentinel 5.3 (Mar. 2012): 14-18. Web. 13 Jan. 2013; Tawil,

Camille. Brothers in Arms: The Story of al-Qaida and the Arab Jihadists (London: Saqi, 2010), 181.

[70] Asal et al. Terrorist Networks Over Time, 31; Oots. A Political Organization Approach,, 32.

[71] Quoted in: An Interview with Abdelmalek Droukdal.

[72] Sedgwick, Mark. Inspiration and the Origins of Global Waves of Terrorism. Studies in Conflict and Terrorism 30.2 (2007), 99.

[73] Byman, Daniel. Deadly Connections: States that Sponsor Terrorism (New York: Cambridge UP, 2005), 41.

[74] Della Porta, Donatella. Left-Wing Terrorism in Italy. Terrorism in Context. (Ed.) Martha Crenshaw. (University Park: Pennsylvania State UP, 1995), 122.

[75] Barnett, Michael. Identity and Alliances in the Middle East. The Culture of National Security: Norms and Identity in World Politics. Ed. Peter J. Katzenstein.

(New York: Columbia UP, 1996), 410.

[76] Telhami, Shibley and Michael Barnett, (Eds.) Identity and Foreign Policy in the Middle East (Ithaca: Cornell UP, 2002), 183.

[77] Snow, David. Collective Identity and Expressive Forms. CSD Working Papers, Center for the Study of Democracy, UC Irvine 1.7 (2001); Banchoff, Thomas.

German Identity and European Integration. European Journal of International Relations 5.3 (1999), 268.

[78] Post, Jerrold. The Mind of the Terrorist: The Psychology of Terrorism from the IRA to al-Qaeda (New York: Palgrave Macmillian, 2007), 8.

[79] Barnett. Identity and Alliances in the Middle East, 410.

[80] Rapoport, David C. The Four Waves of Modern Terrorism. Attacking Terrorism: Elements of a Grand Strategy. Ed. Audrey Kurth Cronin and James M. Ludes.

Washington: Georgetown UP, 2004, 56.

[81] Della Porta. Left-Wing Terrorism in Italy. Terrorism in Context. Ed. Crenshaw, 122.

[82] Drake, C.J.M. The Role of Ideology in Terrorists Target Selection. Terrorism and Political Violence 10.2 (1998), 54.

[83] Borum, Randy. Psychology of Terrorism. (Tampa: University of South Florida, 2004), 41.

[84] Della Porta. Left-Wing Terrorism in Italy, 149.

[85] Crenshaw, Martha. An Organizational Approach to the Analysis of Political Terrorism. Orbis, 29.3 (1985), 471.

[86] Al-Qaiida Bylaws (English Translation). Combating Terrorism Center at West Point, n.d.

[87] United States District Court Southern District of New York v. Usama Bin Laden et al Defendants. Indictment: s(9) 98 cr. 1023. (Department of Justice. New

ISSN 2334-3745 24 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

York. 2000), 7.

[88] Karmon. Coalitions Between Terrorist Organizations. 41-2, 287-292; Walt, Stephen. The Origins of Alliances., 35-40.

[89] Abu -Sharif, Bassam, and Uzi Mahnaimi. Best of Enemies: The Memoirs of Bassam Abu-Sharif and Uzi Mahnaimi (Boston: Little, Brown and Company, 1995),

61.

[90] Becker, Jillian. Hitlers Children: The Story of the Baader-Meinhof Terrorist Gang (Philadelphia: Lippincott, 1977), 70; AbuKhalil, Asad. Internal Contradictions

in the PFLP: Decision Making and Policy Orientation. Middle East Journal 41.3 (1987), 364; Alexander and Pluchinsky. European Terrorism Today and Tomorrow.

[91] Della Porta. Left-Wing Terrorism in Italy. Terrorism in Context. M. Crenshaw (Ed.), 133.

[92] Popular Front for the Liberation of Palestine Information Department. A Strategy for the Liberation of Palestine /the Popular Front for the Liberation of

Palestine (P.F.L.P.) (Amman: P.F.L.P. Information Department, 1969), 8.

[93] McCormick. Terrorist Decision-Making, 487.

[94] Sagan, Scott. The Perils of Proliferation: Organization Theory, Deterrence Theory, and the Spread of Nuclear Weapons. International Security 18.4 (1994), 72.

[95] Crenshaw. Theories of Terrorism, 18.

[96] McCormick. Terrorist Decision-Making, 490; Crenshaw, Martha. An Organizational Approach. 473, 480.

[97] Crenshaw. An Organizational Approach, 480.

[98] Fiol, C. Marlene and Marjorie A. Lyles. Organizational Theory. The Academy of Management Review 10.4 (1985), 811; Jackson, Brian. Organizational

Learning in Terrorist Groups. Working Paper, RAND Corp, 2004, 3-4.

[99] Fiol and Lyles. Organizational Theory, 811.

[100] Jackson. Organizational Learning in Terrorist Groups, 3-4.

[101] Miles, Raymond E., Charles Snow, Alan Meyer, and Henry Coleman Jr. Organizational Strategy, Structure, and Process. The Academy of Management Review

3.3 (1978), 558.

[102] Fiol and Lyles. Organizational Theory, 804.

[103] Grant, Robert M., and Charles Baden-Fuller. A Knowledge Accessing Theory of Strategic Alliances. Journal of Management Studies 41.1 (2004), 62.

[104] Steinhoff, Patricia. Portrait of a Terrorist: An Interview with Kozo Okamoto. Asian Survey 16.9 (1976): 832; Steinhoff, Patricia. Personal Interview. 9 Sep.

2011 and 11 Nov. 2011; Steinhoff, Patricia. Interview by David Marx Neojaponisme. 2007. Web. 15 Sept. 2011. (3); Aust. Personal Interview.

[105] Yallop, David. Tracking the Jackal: The Search for Carlos, the Worlds Most Wanted Man (New York: Random House, 1993), 340; United States. Department

of State, Headquarters. NATO Consultations On Terrorism. Declassified Report, Digital National Security Archive, Mar. 1973. Web; Coll, Steve. Ghost Wars: The

Secret History of the CIA, Afghanistan, and bin Laden, from the Soviet Invasion to Sep. 10, 2001 (New York: Penguin Books, 2004), 155-7; United States. Central

Intelligence Agency. Historical Background of Islamic Army and bin Ladens Move from Afghanistan to Sudan. Declassified Information Report, Digital National

Security Archive, Nov. 1996, 5; Benjamin, Daniel, and Steven Simon. The Age of Sacred Terror (New York: Random House, 2002), 112; United States. Central

Intelligence Agency. Terrorism: Usama bin Ladens Activities in Somalia and Sudan NIF Support. Declassified Intelligence Report, Digital National Security

Archive, Apr. 1997.

[106] Rapoport, David. The Four Waves of Modern Terrorism. Ed. Cronin and Ludes. 56; Varon, Jeremy. Bringing the War Home: The Weather Underground, the

Red Army Faction, and Revolutionary Violence in the Sixties and Seventies, (Berkeley:U of California P, 2004), 69.

[107] Gerges. The Far Enemy: Why Jihad Went Global, 25, 66.

[108] Hoffman. Inside Terrorism. 63; Charbel, Ghassan. Asrr al-sundq al-aswad (The Secrets of the Black Box). Trans. Nate Wilson. (Beirut: Riyad El-Rayyes Books,

2008), 61.

[109] See, for example, al-Qaidas frustration with the damage ISIS did to al-Qaidas reputation, as expressed in Combating Terrorism Center at West Point,

Harmony Document SOCOM-2012-0000005 (2010), 7.

[110] Burke. Al-Qaeda: The True Story of Radical Islam. 133; Scheuer, Michael. Through Our Enemies Eyes: Osama bin Laden, Radical Islam, and the Future

of America. (Washington: Potomac Books, Inc., 2006.) 182; Hegghammer, Thomas. Jihad in Saudi Arabia: Violence and Pan-Islamism Since 1979. (New York:

ISSN 2334-3745 25 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Cambridge UP, 2010), 108.

[111] Abu-Sharif and Mahnaimi. Best of Enemies. 59-60; Sayigh. Armed Struggle and the Search for State. 214-305; Bulloch, John. George Habash: Palestinian

Terrorist Leader. The Independent 28 Jan. 2008: (36); Schweitzer, Yoram, and Noam Ophir. The Rise and Fall of the International Terrorism Strategy of George

Habashs Popular Front for the Liberation of Palestine. Unpublished paper, (Institute for National Security Studies Tel Aviv University, 2008), 9.

[112] Schweitzer, Yoram. Personal Interview. Mar. 2012; Hoffman. Inside Terrorism, 158.

[113] United States. Central Intelligence Agency, Directorate of Intelligence, Office of Political Research. The Palestinian Arabs. Digital National Security Archive.

Mar. 1976. Web; Byman, Daniel. A High Price: The Triumphs and Failures of Israeli Counterterrorism (New York: Oxford UP, 2011), 36.

[114] Hoffman. Inside Terrorism, 78-79.; Aust, Stephan. Baader-Meinhof: The Inside Story of the R.A.F. Trans. Anthea Bell. (Oxford: Oxford UP, 2009), 294.

[115] Crilly, Rob. Pakistani terror group swears allegiance to Islamic State. The Telegraph. http://www.telegraph.co.uk/news/worldnews/asia/pakistan/10955563/

Pakistani-terror-group-swears-allegiance-to-Islamic-State.html?utm_source=Sailthru&utm_medium=email&utm_term=*AfPak%20Daily%20Brief&utm_

campaign=2014_The%20South%20Asia%20Daily.

[116] Harmony Document SOCOM-2012-0000009. (West Point: Combating Terrorism Center).

[117] Boko Harams International Connections | Combating Terrorism Center at West Point. Combating Terrorism Center at West Point RSS. https://www.ctc.

usma.edu/posts/boko-harams-international-connections.

[118] See Tankel, Stephen. Storming the World Stage: The Story of Lashkar-e-Taiba. (New York: Columbia UP, 2011) for an excellent history and analysis of the group.

[119] The Weekly Voice. Indian Mujahideen Has Links With Pakistan, Lashkar. http://www.weeklyvoice.com/south-asian-news/%E2%80%98indian-mujahideen-

has-links-with-pakistan-lashkar%E2%80%99/; Rediff: India Abroad. Revealed: LeTs close ties with Indian Mujahideen. Revealed: LeTs close ties with Indian

Mujahideen. http://www.rediff.com/news/2009/feb/07beng-let-close-ties-with-indian-mujahideen.htm; George, Varghese K. Indian Mujahideen has links with

Pak, Lashkar. .http://www.hindustantimes.com/world-news/indian-mujahideen-has-links-with-pak-lashkar/article1-636537.aspx.

[120] Hoffman. Inside Terrorism,78; Alexander and Pluchinsky. European Terrorism Today and Tomorrow. 44-5, 164-5. Alexander and Pluchinsky. Europes Red

Terrorists: The Fighting Communist Organizations (New York: Frank Cass, 1992), 40-46.

[121] Hoffman. Inside Terrorism, 78.

ISSN 2334-3745 26 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

An Exploratory Study on the Impact of Electoral Participation upon a


Terrorist Groups Use of Violence in a Given Year
by Stephen McGrath and Paul Gill

Abstract
Recent studies seeking to understand the determinants of terrorism tend to focus upon situational, rather than
structural measures. Typically these studies examine the interaction of terrorist attacks and repressive state
actions. However, we know very little about other situational measures that may impact upon a groups scale of
violent activity within a particular year. This preliminary study analyses terrorist attacks committed by both the
Provisional IRA (PIRA) and ETA and the electoral performances of the groups political wings, Sinn Fein and
Batasuna, from 1970 to 1998 and from 1978 to 2005 respectively. More specifically, this paper examines whether
the nature and content of terrorist attacks differ in the build-up to that groups political-wing participating
in elections. In other words, this article is a preliminary study of the influence of electoral participation on
attack frequency and target selection. Results suggest that PIRA significantly decreased their attacks in an
election year and this had a positive impact upon Sinn Feins electoral performance. On the other hand, ETA
significantly increased its attacks in an election year and this had no significant impact upon Batasunas electoral
performance.

Keywords: Terrorism, election, violence, target selection

Introduction
Historically, the analysis of the quantity and quality of terrorist attacks has typically focused upon
correlations with root causes. These root causes include (but are not necessarily limited to) factors like
educational attainment, [1] economic performance [2] and regime type. [3] The relatively easy availability
of such measures makes them suitable for large-scale, cross-country comparative approaches. The aggregate
nature and relative inflexibility of these measures (e.g. propensity to change from one year to another) makes
them unsuitable for single-case study approaches where the dependent variable varies substantially from year
to year.

More recently, studies seeking to understand the determinants of terrorism tend to focus upon situational
measures that are likely to fluctuate across the time period under consideration. Typically these studies
examine the interaction of terrorist attacks and repressive state actions in diverse cases such as Northern
Ireland, [4] Palestine, [5] Chechnya, [6] Egypt, [7] Pakistan [8] and Iraq [9]. Apart from blue-team/read-
team interactions, we know very little about other situational measures that may impact upon a groups
scale of violent activity within a particular year. This lack of focus is worrying considering the fact that such
situational measures are far more malleable to counter-terrorism policies than root-cause measures that are
usually deeply entrenched.

Given the seeming consensus that terrorism is often deployed to impact upon the political process, it
is odd that there have been relatively few quantitative examinations (apart from studies of regime type
and regime structure) [10] of how the shifting political sphere impacts upon levels terrorist activity.
Newmans cross-national study illustrates that terrorist violence increases closer to an election date. [11]
Bali and Park disaggregated terrorist attacks into domestic and transnational types. [12] They found that
while transnational attacks decline prior to elections, domestic attacks increase. Both studies make no

ISSN 2334-3745 27 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

differentiation between groups who are participating in these elections (through their political wing) and
those who are not. De la Calle and Sanchez-Cuenca, on the other hand, take the case of ETA and highlight
how its violent activity impacts upon its political support. [13] The evidence suggests that ETAs political
wing, Batasuna, loses support when ETA kills members of the security forces and non-nationalist politics;
while support increases when ETA kills informers and drug dealers. The de la Calle and Sanchez-Cuenca
article highlights the importance of (a) quantitative and longitudinal studies based on a single case and
(b) disaggregating across target type. Finally, Berrebi and Klor examine how the electorate are sensitive to
terrorism. Basically, they conclude that victimized groups become ideologically polarized. [14] Admittedly,
their focus is upon the electoral behavior within the victimized group, but it is not a big leap to suggest that it
could also impact upon the voting behaviour of the constituency that the terrorist group claims to represent.

In this preliminary study, we analyze the cases of two terrorist groups that also had political wings
participating in electoral politics. We analyze terrorist attacks committed by both the Provisional IRA (PIRA)
and ETA and the electoral performances of the groups political wings, Sinn Fein and Batasuna, from 1970
to 1998 and from 1978 to 2005 respectively. More specifically, we are interested in examining whether the
nature and content of terrorist attacks differ in the build-up to that groups political wing participating in
elections. In other words, this article is an exploratory study of the influence of political participation on
attack frequency and target selection. We are interested in answering the three questions: Does political
participation in a given year impact upon attack frequency? Does political participation in a given year
impact upon attack frequency equally across different targets? Does targeting impact upon electoral results?

ETA and PIRA are a natural duo to compare given their similar ethno-nationalist goals, period of operation
and types of violence deployed. Indeed, many studies have compared these groups along factors such as:
their social background, [15] levels of public support, [16] strategic orientation, [17] target selection, [18]
individual motivations for joining, [19] tactical choice, [20] structure, [21] and legitimisation strategies. [22]

Data
We measured aggregated terrorist attack frequency year-on-year against the electoral participation of
the groups political wing. In both cases, the analysis totaled eight years of electoral activity and twenty
years of non-electoral activity. We stratified terrorist attacks according to the Global Terrorism Databases
classification. We also evaluated associations between political vote gains and target choice by correlating all
target selections with Sinn Fein and Batasuna electoral performance.

Voting records (both District and Parliamentary) were obtained from the Northern Irish ARK political
research database [23] and the Basque government official website.[24] Data regarding terrorist attack
frequency and target selection from Northern Ireland (N = 1874) and Spain (N = 1916) were supplied by
the Global Terrorism Database (GTD, START), which consequently provided the disaggregation of attacks
into their respective target selections. GTD data was aggregated with vote count and percentage share data
acquired by the government election records in the same dataset. A control group was formed in order to
measure the attack frequency on non-election years: neutral years within the time period of 1970-2005 were
selected provided they did not feature political activity. In the Spanish case study, election years were: 1979,
1980, 1983, 1986, 1987, 1990, 1991, and 1994, crossing Municipal (District) and Assembly cases. The election
years selected for the Northern Irish elections were: 1982, 1985, 1989, 1994, 1996, 1997, 1998, 2003, crossing
District and Assembly cases, as well as one European case (1994). We were unable to utilise local 1993 voting
data because GTD possesses no data for that year. The decision was made to use the 1994 European election
results for Sinn Fein and the corresponding attack frequency instead.

ISSN 2334-3745 28 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Results
Figure 1 illustrates the frequency of IRA and ETA attacks from 1975 to 1999. It highlights general fluctuations
in both the Northern Irish and Spanish case studies, while an overall decline in attacks is observed towards
the late 1990s in both cases.

Figure 1 Attack frequency of the IRA and ETA (1975-1999)

First we test whether the levels of terrorism experienced were affected (either positively or negatively) by
electoral participation in a given year. We conducted an independent t-test to determine whether there was a
significant difference in the mean number of attacks in election and non-election years for both cases. Both
cases reflected drastically different results. PIRA engaged in a (partially) significant lower number of attacks
within election years than non-election years. Indeed, Table 1 illustrates that PIRA engaged in almost 50%
fewer attacks in election years (45 attacks vs. 84 attacks). On the other hand, ETA engaged in significantly
more attacks in electoral years than non-electoral years (94 attacks vs. 45 attacks). Table 2 highlights the fact
that ETA engaged in more than double the number of attacks in electoral years.

Table 1 Independent t-test of attack frequency against (District and Parliament) electoral participation
Northern Ireland

Electoral Year N Mean Standard t-Stat. Sig. (2-tail)

Deviation
YES 8 45.25 47.43 -1.957 .061*
NO 20 84.70 48.44

*Significant at the 0.1 Level

ISSN 2334-3745 29 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Table 2 Independent t-test of attack frequency against (District and Parliament) electoral participation - Spain

Electoral Year N Mean Standard t-Stat. Sig. (2-tail)

Deviation
YES 8 94.38 40.49 2.762 .010***
NO 20 45.45 43.00

***Significant at the 0.01 Level

Together the results suggest that the violence conducted by both groups were significantly different in
election and non-election years although the effects were entirely different. Next we test whether this
difference remained consistent across all target types or whether some targets were attacked significantly
more (in ETAs case) or less (in PIRAs case). In other words, we tested whether the established increase/
decrease in attack methods was disproportionately due to an increase/decrease in attacks on one type of
target or whether it was a general trend.

Figure 2 illustrates PIRAs relative target selection across the time period under consideration. The results
reflect the changing picture of target selection with certain strategies fluctuating consistently with overall
attacks (Military Attacks), and others taking on more unpredictable patterns (Business, Citizen Attacks).

Figure 2 IRA target selection over time (1973-2001)

We then conducted a series of Independent t-tests to analyze the frequency of attacking these targets in
election and non-election years. The results demonstrate that while all target types are attacked less in
election years, this effect is particularly prominent and statistically significant with regards to both attacks on
businesses and attacks on the military.

ISSN 2334-3745 30 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Table 3 Independent t-test for selected targets against electoral participation

IRA Target Electoral Year N Mean t-Stat Sig. (2-tail)


Infrastructure Attacks (YES) 8 1.38 -.408 .687
(NO) 20 1.75
Citizen/Property Attacks (YES) 8 9.13 -.857 .399
(NO) 20 12.40
Business Attacks (YES) 8 6.00 -1.799 .086*
(NO) 20 17.30
Police Attacks (YES) 8 10.75 -1.665 .108
(NO) 20 19.75
Military Attacks (YES) 8 11.38 -2.270 .037**
(NO) 20 24.10

**Significant at the 0.05 Level; *Significant at the 0.10 Level

Turning to the case of ETA, we applied the same procedures. Figure 3 illustrates the strong focus on targeting
businesses and police throughout the time period analysed. Attacks on citizens and infrastructure are
inconsistent chronologically and do not appear to establish any general trends.

Figure 3 ETA target selection over time (1970-1999)

The series of Independent t-tests illustrate that ETAs increased use of terrorist attacks in electoral years was
predominantly carried out against business, police and military targets.

ISSN 2334-3745 31 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Table 4 Independent t-test for selected targets against electoral participation

ETA Target Electoral Year N Mean t-Stat Sig. (2-tail)


Infrastructure Attacks (YES) 8 6.75 .697 .492
(NO) 20 5.00
Citizen/Property Attacks (YES) 8 4.13 -.077 .952
(NO) 20 4.30
Business Attacks (YES) 8 32.75 3.100 .005***
(NO) 20 13.50
Police Attacks (YES) 8 29.50 2.603 .015**
(NO) 20 12.90
Military Attacks (YES) 8 8.88 4.848 .000****
(NO) 20 2.85

****Significant at the 0.001 Level; ***Significant at the 0.01 Level; **Significant at the 0.05 Level

We also tested whether these differences were apparent both a week before and after the election and a month
before and after the election. No significant differences were apparent. Evidently, the two groups engaged in
significantly different tactical practices in election and non-election years, but not months or weeks. This may
reflect long-term strategic planning (in terms of the increase/decrease in attacks occurring much earlier) and/
or the level of time it takes for strategic plans to be put into force (in terms of the increase/decrease in attacks
occurring much later after the election).

The above results suggest that in Northern Ireland, target selection decreases universally with particular
reference to business and military, whilst in Spain, these same targets (in addition to the police) are affected
in a significant positive direction. This may be due to a number of reasons including opportunity costs,
counter-terrorism practices, and target hardening. It could also be due to the impact of targeting practices on
electoral performance, an aspect which we turn to next.

To explore the relationship between voting patterns and attack strategy, we utilised a Pearsons product-
moment Bivariate Correlation, in which the vote counts for Sinn Fein and Batasuna (indicated as 1 in
the matrix) were correlated with each target choice in turn. General assumptions were met prior to the
undertaking of the test, including the normal distribution of the variables. Table 5 outlines the results for
PIRA.

Table 5 Matrix of target selection and vote quantity (PIRA)

Matrix (Votes and SD (Standard 1 2 3 4 5


Target Selections) Deviation)
1.Votes 94889.88
2.Infrastructure 1.91 -.322
3.Citizens/Property 10.27 -.876*** .443**
4.Business 14.91 -.720** .381 .580***
5.Police 18.00 -.678 .594** .470** .645***
6.Military 17.23 -.782** .489** .406 .376 .782**

***Significant at the 0.01 level; **Significant at the 0.05 level.

ISSN 2334-3745 32 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

It is important to clarify that all associations are negative; the less a particular target is attacked, the higher
vote tally Sinn Fein achieved in that year. In other words, the results suggest that the more discriminate
PIRA was in its use of violence, the greater the benefit for Sinn Fein. The fact that the comparison of means
test (above) illustrated a negative downturn in attacks (by almost a half) in electoral years and that these
downturns corresponded with Sinn Fein gaining electoral points, suggests that more was at play than
more sensitive counter-terrorism practices in the immediate build-up to the election itself. The significant
downturn in attacks against businesses and the military also reflect PIRAs strategic orientation of improving
their political position impacting upon day-to-day tactical operations. The results also run contrary to
the large-N analyses conducted by Newman [11] and Bali and Park [12] who found that terrorist attacks
increased when elections are held.

Table 6 outlines the results of the same test applied to the ETA case. Again, the associations are all negative.
The more ETA engaged in attacks on all targets (apart from citizens) the less Batasuna achieved in the
election although none of these associations displayed significant scores. While ETA engaged in significantly
more attacks on particular targets in election years, there is no evidence to suggest that this resulted in greater
political support. In other words, PIRAs strategy paid off while ETAs made no discernible difference at all.

Table 6 Matrix of target selection and vote quantity (ETA)

Matrix (Votes and SD (Standard 1 2 3 4 5


Target Selections) Deviation)
1.Votes 173542.38
2.Infrastructure 6.78 -.443
3.Citizens/Property 5.78 .304 -.294
4.Business 25.83 -.528 .274 .227
5.Police 22.39 -.329 .500** .117 .717***
6.Military 6.78 -.431 .120 .141 .423 .315

***Significant at the 0.01 Level; **Significant at the 0.05 level.

The results differ from the de la Calle and Sanchez-Cuenca [13] findings, outlined above, for a couple
of reasons. First, it must be pointed out here that the category of citizen utilized by GTD is quite all-
encompassing and includes informers and drug dealers two categories of target that they showed
significantly increased Batasunas vote. Second, de la Calle and Sanchez Cuenca measured the number of
people killed as opposed to our measure of number of attacks committed.

Conclusion
The contrasting results highlight the utility of examining both situational drivers of terrorist activity as well
as longitudinal quantitative case studies. Despite their structural, ideological and aspirational similarities,
PIRA and ETA displayed markedly different behaviours in years that their political wing engaged in elections.
PIRAs violent attacks significantly declined while ETAs significantly increased. While PIRAs strategy paid
dividends politically, ETAs did not. PIRAs propensity to reduce the frequency of their attacks on both
businesses and the military may have been driven by a need to avoid negatively impacting their constituency
during the build-up to the election, either by disturbing their routine activities or provoking a military
backlash. Interviews with former militants and other qualitative research may be helpful for validating this.

ISSN 2334-3745 33 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

It would also be interesting to see how these dynamics play out in a non-European setting. Both ETA and
PIRA were relatively discriminate compared to some Middle Eastern groups many of whom possess multiple
rivals vying for political and social support. Focusing on Middle Eastern groups would add further layers of
complexity to our understanding of the link between political participation and the frequency of terrorist
attacks, although relatively few of those groups have put forward a political wing to participate in electoral
processes. Additionally, further studies necessitate factoring in the potential impact of a governments
counterterrorism efforts, and also accounting for the geographic distribution of potential targets in relation to
both groups constituency base. [14]

One thing is for certain however; engaging in electoral politics in a given year corresponded to a change in
both ETA and PIRAs violent output on both an aggregate level (against all targets) and a disaggregated level
(against specific targets). Such results reflect organizational behavior and strategy of terrorist groups, and
can help feed into security decisions concerned with risk assessment of particular targets in the build-up to
an election. The same is true for directing finite resources toward protecting targets that may be particularly
valued by a terrorist organization in a given context. The results also illustrate the importance of context
when making policy-making decisions. While large-N, comparative and aggregated studies can help elucidate
general trends, they may miss some of the subtlety, nuance and case-specific drivers of behaviours.

Our exploratory study is just a minor step in what seems a general trend toward this kind of analysis. [22]
Its main finding is that despite the fact that PIRA and ETA are very similar organisations, with both of them
having democratic political parties, their attack and targeting strategies seem to be related electoral to cycles,
but in divergent ways, necessitating very different counter-terrorism strategies and practices.

About the Authors: Stephen McGrath is currently undertaking a PhD in Politics and International Relations at
the University of East Anglia. He holds an MSc in Security and Crime Science from University College London,
and a BA in Politics from the University of Bath. Paul Gill is a lecturer at University College Londons Depart-
ment of Security and Crime Science. His book on lone-actor terrorism is forthcoming with Routledge -http://
www.routledge.com/books/details/9781138787568/

Notes
[1] Krueger, A. B., & Maleckova, J. (2003). Education, poverty and terrorism: Is there a causal connection?. The Journal of Economic Perspectives, 17(4), 119-144.

Testas, A. (2004). Determinants of terrorism in the Muslim world: an empirical cross-sectional analysis. Terrorism and Political Violence, 16(2), 253-273. Brockhoff,

S., Krieger, T., & Meierrieks, D. (2010). Ties That Do Not Bind (Directly)The Education-Terrorism Nexus Revisited. Center for International Economics Working

Paper, (2010-02).

[2] Abadie, A. (2004). Poverty, political freedom, and the roots of terrorism (No. w10859). National Bureau of Economic Research. Bravo, A. B. S., & Dias, C. M. M.

(2006). An empirical analysis of terrorism: Deprivation, Islamism and geopolitical factors. Defence and Peace Economics, 17(4), 329-341. Gries, T., Krieger, T., &

Meierrieks, D. (2011). Causal linkages between domestic terrorism and economic growth. Defence and Peace Economics, 22(5), 493-508. Piazza, J. A. (2006). Rooted

in Poverty?: Terrorism, Poor Economic Development, and Social Cleavages 1. Terrorism and Political Violence, 18(1), 159-177.

[3] Chenoweth, E. (2013). Terrorism and Democracy. Annual Review of Political Science, 16, 355-378. Savun, B., & Phillips, B. J. (2009). Democracy, foreign policy,

and terrorism. Journal of Conflict Resolution, 53(6), 878-904. Wade, S. J., & Reiter, D. (2007). Does democracy matter? Regime type and suicide terrorism. Journal of

Conflict Resolution, 51(2), 329-348.

[4] Lafree, Gary, Laura Dugan and Raven Korte. 2009. The Impact of British Counterterrorist Strategies on Political Violence in Northern Ireland: Comparing

Deterrence and Backlash Models. Criminology 47(1): 17-45. Asal, V., P. Gill, K. Rethemeyer and J. Horgan. (Forthcoming, 2014) Killing Range: Explaining

Lethality Variance Within a Terrorist Organization. Journal of Conflict Resolution

ISSN 2334-3745 34 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

[5] Hafez, Mohammed M. and Joseph M. Hatfield. 2006. Do Targeted Assassinations Work?: A Multivariate Analysis of Israels Controversial Tactic During the

Al-Aqsa Uprising. Studies in Conflict and Terrorism. 29(4): 359-382. Dugan, L., & Chenoweth, E. (2012). Moving Beyond Deterrence. The Effectiveness of Raising

the Expected Utility of Abstaining from Terrorism in Israel. American Sociological Review, 77(4), 597-624. Maoz, Zeev. 2007. Evaluating Israels Strategy of Low-

Intensity Warfare, 1949-2006. Security Studies 16: 319-349. Benmelech, Efraim., Claude Berrebi and Esteban Klor. 2010. Counter-Suicide-Terrorism: Evidence

from House Demolitions. NBER Working Paper 16493.Kaplan, E.H., A. Mintz, S. Mishal and C. Samban. 2005. What Happened to Suicide Bombings in Israel?

Insights from a Terror Stock Model. Studies in Conflict and Terrorism 28(3): 225-235.

[6] Lyall, Jason. 2009. Does Indiscriminate Violence Incite Insurgent Attacks? Evidence from Chechnya. Journal of Conflict Resolution 53(3): 331-362.

[7] Fielding, D. and Anja Shortland. 2010. An Eye for an Eye, a Tooth for a Tooth: Political Violence and Counter-Insurgency in Egypt. Journal of Peace Research

47(4): 433-448.

[8] Johnston, Patrick. 2012. Does Decapitation Work? Assessing the Effectiveness of Leadership Targeting in Counterinsurgency Campaigns. International Security

36(4): 47-79. Ismail, A., & Amjad, S. (2014). Determinants of terrorism in Pakistan: An empirical investigation. Economic Modelling, 37, 320-331.

[9] Condra, L. and Jacob Shapiro. 2012. Who Takes the Blame? The Strategic Effects of Collateral Damage. American Journal of Political Science 56(1): 167-187.

Braithwaite, A., and Johnson, S. D., 2012. Space-Time Modelling of Insurgency and Counterinsurgency in Iraq. Journal of Quantitative Criminology, 28(1): 31-48.

Linke, Andrew, Frank Witmer and John OLoughlin. 2012. Space-Time Granger Analysis of the War in Iraq: A Study in Coalition and Insurgent Action-Reaction.

International Interactions: Empirical and Theoretical Research in International Relations 38: 402-425.

[10] Li, Q. (2005). Does democracy promote or reduce transnational terrorist incidents? Journal of Conflict Resolution, 49(2), 278-297. Chenoweth, E. (2010).

Democratic competition and terrorist activity. The Journal of Politics, 72(01), 16-30. Young, J. K., & Dugan, L. (2011). Veto players and terror. Journal of Peace

Research, 48(1), 19-33.

[11] Newman, L. S. (2013). Do Terrorist Attacks Increase Closer to Elections?. Terrorism and Political Violence, 25(1), 8-28.

[12] Bali, V. A., & Park, J. (2014). The Effects of the Electoral Calendar on Terrorist Attacks. Electoral Studies.

[13] De la Calle, L., & Snchez-Cuenca, I. (2013). Killing and voting in the Basque country: An exploration of the electoral link between ETA and its political

branch. Terrorism and Political Violence 25(1):94-112.

[14] Berrebi, C., & Klor, E. F. (2006). On Terrorism and Electoral Outcomes Theory and Evidence from the Israeli-Palestinian Conflict. Journal of Conflict

Resolution, 50(6), 899-925. Berrebi, C., & Klor, E. F. (2008). Are voters sensitive to terrorism? Direct evidence from the Israeli electorate. American Political Science

Review, 102(03), 279-301.

[15] Waldmann, P. (2005). The radical community: A comparative analysis of the social background of ETA, IRA, and Hezbollah. Sociologus, 55(2), 239-257.

[16] Hewitt, C. (1990). Terrorism and public opinion: A five country comparison. Terrorism and Political Violence, 2(2), 145-170.

[17] Sanchez-Cuenca, I. (2007). The dynamics of nationalist terrorism: ETA and the IRA. Terrorism and Political Violence, 19(3), 289-306.

[18] De la Calle, L., & Snchez-Cuenca, I. (2006). The production of terrorist violence: analyzing target selection within the IRA and ETA (Vol. 230). Centro de

Estudios Avanzados en Ciencias Sociales, Instituto Juan March de Estudios e Investigaciones.

[19] Alonso, R. (2006). Individual motivations for joining terrorist organizations: a comparative qualitative study on members of ETA and IRA. Tangled Roots: Social

and Psychological Factors in the Genesis of Terrorism, 11, 187.

[20] Kalyvas, S., & Snchez-Cuenca, I. (2005). Killing without dying: the absence of suicide missions. Making sense of suicide missions, 209-232. Rooney, N. (2007).

Violent Nationalism in Catholic Communities: The Provisional IRA and ETA. Studies in Ethnicity and Nationalism, 7(3), 64-77.

[21] Waldmann, P. (1992). Ethnic and socio-revolutionary terrorism: a comparison of structures. International Social Movement Research, 4, 237-257.

[22] Sullivan, C. M. (2012). Blood in the Village: A Local-Level Investigation of State Massacres. Conflict Management and Peace Science, 29(4), 373-396.

[23] http://www.ark.ac.uk/elections/

[24] http://www.euskadi.net/elecciones/

ISSN 2334-3745 35 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Terrorist Networks Productivity and Durability: A Comparative Multi-level


Analysis
by Arie Perliger

Abstract
Terrorist networks, similar to the more traditional terrorist organizations, employ violence in order to promote
political and social changes. By utilizing a unique dataset of 18 terrorist networks the current study contributes
to the growing body of literature on terrorist networks by examining the factors that determine network
productivity and durability. The findings illustrate how effective networks generally operate within supportive
and homogeneous communities, tolerant of the violent struggle. The findings also suggest that while funding
and operational knowledge/training are not strong predictors of operational success, they seem to be potential
preconditions for the formation of the networks, and for a network to shift from the ideological radicalization
stage into the operational/behavioral stage. Finally, when looking at the structural characteristics that
differentiate successful from less successful networks, it seems that the most important elements are the ability of
the successful networks to effectively balance between cohesiveness and flexibility while preserving their dynamic
nature.

Keywords: Terrorist networks, organizational behavior

Introduction
The term new terrorism entered academic discourse during the 1990s as researchers reported an
unprecedented rise in the number of victims, the use of new and highly destructive tactics, and a
preponderance of fanatical supra-national religious groups carrying out the terrorism.[1] Furthermore,
the structure of the new groups, it was assumed by many, was fundamentally different from that of more
traditional terrorizing groups (e.g., IRA, ETA, Fatah). While the lattertermed terrorist organizations
were characterized by clear lines of authority, a formalized hierarchy and a set of organizational functions
and decision-making bodies (such as central committees, headquarters, etc.), many of the new groups
termed terrorist networksassumed a horizontal flat structure, based on non-formal social relations
and a high level of interdependence among the different actors comprising the group.[2] As the academic
community began to pay more attention to these networks, new methods were developed for deciphering
the processes and social dynamics within them.[3] Less attention was given to the differences in the ways
these groups endor more accurately, to their different levels of operational success (in carrying out attacks)
and durability. Why, for example, were Hamas networks (active in the West Bank during the early 2000s)
able to produce long-term campaigns of violence, while otherse.g., many of the Jihadist networks active
in Europe could have been described as one-hit wonders, or were dismantled before even being able to
initiate their first significant attack?

The current article contributes to the growing body of literature on terrorist networks by looking at the
factors determining network productivity and durability. The next two sections will conceptualize the
terrorist network and will detail a theoretical framework identifying the potential factors influencing
network operational characteristics. This is followed by a methodological section and an empirical analysis
seeking to test the proposed theoretical framework. The concluding section will assess the remaining
theoretical gaps and the main implications of the findings.

ISSN 2334-3745 36 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Between Terrorist Organization and Terrorist Network Defining the Research Population
Defining the research population of this study is not an easy task. While most scholars of terrorism
acknowledge that a growing number of terrorist groups are better analyzed from a network-centric
perspective rather than from a classic organizational outlook,[4] limited attempts have been made to draw a
clear line between the two forms of terrorist groups. Most studies refer to small social networks that possess
a dynamic structure and limited hierarchy, without attempting to provide a wider framework of analysis to
distinguish them from the old traditional, formal and hierarchical terrorist organizations.[5] Outside the
realm of political violence studies, it seems that both political scientists and sociologists tend to emphasize
the absence of formal and clear lines of authority and/or distribution of functions within flat networks
in comparison to the formal organizations which possess a role structure distinct from their actual
membership, are clearly bounded, and internally differentiated both in a horizontal (functional) and vertical
direction (differential distribution of rights and duties).[6] These criteria have been utilized in typologies
dealing with social coordination and governance,[7] and typologies dealing with different types of economic
organizations.[8]

In order to clearly define the research population of this study, and to conceptualize the terrorist network, a
deductive analysis of network literature has been utilized, looking into the various characteristics ascribed by
the literature to new terrorist networks in comparison to the traditional older organizations. The findings
have assisted in constructing the classification presented in Table 1.

Table 1 Terrorist Networks versus Terrorist Organizations

Type Hierarchy Size Communication Boundaries


Network Inherently leaderless. Size is limited by Informal, not regulated Elusive borders.
While some members the non-hierarchal or influenced by the Entrances and exits
have more social structure, few functional role of the are in general less
power than others, individuals to several actors, their formal power costly and dynamic.
there are no formal dozen. or other organizational
mechanisms which features. Based on social
institutionalize the relations that are a
status gaps between product of primordial and
members, nor are there previous social ties.
formal routines and
protocols that manifest
the division of power
within the network.
Organization Hierarchal structure, The formal and Communication tends Tend to establish
identifiable leadership. hierarchal structure to correspond with clear identifiable
Division of power is allows expansion of the organizational lines of boundaries
relatively stable. group from few dozens authority and regulated via different
to several hundred and according to the mechanisms,
more. organizational protocols. including formal and
standardized training
and recruiting
procedures.

ISSN 2334-3745 37 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Four main criteria (level of hierarchy, size, internal communication patterns and boundaries) have helped.
to conceptualize the terrorist network and to distinguish it from the more conventional and traditional
terrorist organization. The first is the level of hierarchy. Networks tend to be inherently leaderless. While
some members have more social power than others, especially those with a high level of centrality and/or
closeness (access to a large number of the networks members, or those located in a central position within
the groups social network), there are no formal mechanisms which institutionalize the status gaps between
members, nor are there formal routines and protocols that manifest the division of power within the network.
[9] Moreover, while division of power within organizations is relatively stable, in networks the situation is
more dynamic, and central figures today could quickly become marginal actors tomorrow.[10]

The absence of a clear and stable hierarchy is associated with the size of the group. In general, the larger
the groups size, the more difficult it is to distribute tasks consensually without a high level of hierarchy and
formalization of authority (even in organizations where decisions are generated bottom-up).[11] Large
groups usually display at least some hierarchical features, which foster formalization of group norms and
practices, as well as institutionalization. Hence, the flat nature of terrorist networks eventually limits their
ability to expand. Indeed, the size of most terrorist networks does not exceed several dozen members while
the more traditional terrorist organizations usually have included between several hundred and several
thousand members (e.g., the BR, PLO, IRA and others).[12]

The third criterion refers to patterns of internal communication. In networks, communication between
members is informal, and not necessarily regulated or influenced by the functional role of the actors, their
formal power or other organizational features. Social relations, which are a product of primordial and
previous social ties, have more influence on the patterns of communication within the network. In contrast,
within organizations the communication tends to correspond with organizational lines of authority (hence
limiting communication between members not sharing the same status or functional role) and is regulated
according to the organizational protocols or routines.[13]

Networks and organizations also differ in the way their boundaries are constructed and regulated.
Organizations tend to establish clear identifiable boundaries via different mechanisms, including formal and
standardized training and recruiting procedures.[14] Networks, in contrast, have more elusive borders, and
entrances and exits are in general less costly and more dynamic. In many cases, even the network members
themselves, including central ones, have limited knowledge about the exact size of the network, or the
identity of all of its members.[15] Moreover, since there is no formal recruiting procedure, the members have
a freer hand in engaging in ad-hoc recruitment for specific operational needs.[16] Having recognized the
uniqueness of social networks involved in terrorism it is now possible to examine how these characteristics
determine their operational capabilities and durability.

Operational Success: A Theoretical Framework


Terrorist networks employ violence and propaganda in order to promote political and social changes.
However, the realization of these changes depends on various factors, many of them unrelated directly to the
nature of the groups actual violent campaign.[17] These include government structure and characteristics;
the countrys specific history of violence; various social, demographic and cultural characteristics; the states
counterterrorism capabilities; and the strength and type of response of opposing ideological factions. Hence,
even in cases where political changes are visible following the terrorist groups actions, in many cases it seems
difficult to determine the extent to which the violence initiated by the group contributed to the decision of
the government to modify its policies or to promote changes in the socio-political order. This problem is even

ISSN 2334-3745 38 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

more predominant when analyzing the actions of violent networks, many of them active for relatively short
periods of time, and lacking political and/or civilian wings which frame the political goals of their struggle.

An effective analogy is to a firm that could be highly successful in terms of producing excellent services
or products, but generates limited income as a result of various non-related factors, many of them beyond
its control. In order to bypass the measuring success methodological obstacle, this study will evaluate the
groups operational success and resiliency in terms of its ability to survive and to generate a continuous and
systematic campaign of violence; or more specifically, its durability and productivity. Both of these, rather
than its ability to bring about desired political changes, appear more related to the groups characteristics
(for more on the distinctions between effectiveness and success, in the framework of terrorist groups, see
Crenshaw, 1981).[18]

What are the factors that are associated with these two dimensions of operational success? The terrorism
literature and network-oriented studies provide two sets of variables to consider. The first are the
environmental features, involving the relations between the network and its surroundings. These include
communal support, access to materials and to operational and human resources, as well as the governments
attitude towards the violent campaign.[19] The second are structural characteristics. The networks level of
hierarchy, its density, the existence of subgroups and the way they are tied and structured, the number of
hubs or the network free scale structure,[20] among other attributes, are expected to be associated with its
operational output.[21] The following sections will elaborate on these two sets of factors and the rationale
associating them with a networks durability and productivity

Environmental Factors
The terrorism literature traditionally tends to address the interactions of the terrorist group with its
environment in three main contexts: first, in terms of recruitment and mobilizing support[22]; second, in the
context of funding (and relations with sponsoring states)[23]; and finally, in the operational context of being
able to utilize popular sympathy for the groups cause in order to facilitate the armed struggle.[24] The latter
provides a more comfortable operational environment (access to safe houses, popular logistical assistance,
enhancing members morale and more). In the current study, these three dimensions have been expanded
to portray a more nuanced and context-specific picture of the type and level of intensity of the relations
between the network and its environment. As seen in Table 2, five variables are assumed to be associated with
the type of environment within which the network operates: (a) the type of relations with the surrounding
community; (b) the political authorities attitude to the groups goals and actions; (c) access to funding; (d)
access to recruitment resources; and (e) access to operational knowledge. The extent to which each of these
environmental resources or characteristics was accessible to, or supportive of, the terrorists activities, was
evaluated and coded based on a three level scale optimal, challenging and hostile.

An optimal environment includes cases in which: (O1) the majority of the surrounding community is
supportive of the networks violent activities; (O2) the political authorities promote permissive policiesi.e.,
the government is tolerant or even empathetic to the groups goals and violence (and as a result does not
employ any meaningful counterterrorism measures); (O3) there is stable and continuous access to multiple
recruitment sources (social frameworks whose nature and population characteristics lend themselves to
recruitment, such as educational, cultural or communal institutions that promote, or are tolerant of the
networks militant views); (O4) access to significant and continuous funding resources (such as sponsoring
states, international charity foundations or criminal initiatives that provide substantial revenues to the
network or to some of its members); and (O5) access to operational and military knowledge via multiple

ISSN 2334-3745 39 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

members in the network with military or operational experience.

When some of the above conditions are missing or less accessible, the terrorists will have to confront more
challenging conditions, and will encounter more difficulties in terms of producing violence and survivability.
A more challenging environment is thus defined by (C1) a clear division within the surrounding community
regarding the networks activitieswhile it is not clear if the whole community opposes the violent struggle
or terrorist activities, it is clear that these are not supported by large parts of the community and that
there is significant opposition to violence (in other words, participating in the violent activities provides
limited social capital within the community for the networks members); (C2) active CT effortswhile the
government is not supportive of the networks activities/goals, limited CT measures are employed as a result
of limited capacity or underestimation (or unawareness) of the significance of the threat; (C3) recruitment
limitationsthe network has access to just one recruitment resource, or random and non-continuous
access to multiple recruitment resources; (C4) funding source limitations (e.g., funding is based on one time
financial assistance from an external actor; and (C5) operational knowledge limitationse.g., knowledge is
based on the military experience or training of a single member, or based on short-term specific training of
several members (mostly for specific scenarios or operations).

Finally, a hostile environment is characterized as one in cases in which (H1) the surrounding community
is not supportive of the violent campaign of the network; (H2) the government perceives the networks
actions or terrorism as a significant threat, and thus employs its full CT capabilities; (H3) the network is
based exclusively on self-funding (and the members have no exceptional financial capacities); (H4) there
is no significant access to sources of recruitment (thus, recruitment is based solely on the members close
social networks, including extended family and peers); and (H5) the network has no members with previous
military or operational knowledge, nor access to training.

The empirical section of this study will examines the role of different types of environments, as well as each of
these environmental components, in determining a networks productivity and durability.

Structural Factors
Thus far, attempts to understand the association between the structure of terrorist networks and their
operational outputs has yielded limited theoretical insights. Two main methodological tendencies are deemed
responsible, beginning with the lack of diversity in the research population of most studies in terms of the
groups structure, origin, ideology and level of success. The usage of relatively small samples (and sometimes
just one case study) of networks, originating mostly from one geographical arena or ideological stream, has
prevented the utilization of a classic control group that would allow effective comparative analysis.[25] The
second is the tendency to exclude contextual information about the actors comprising the network from the
network analysis itself or vice versa. Hence, many studies rely solely on qualitative analysis of the networks
social dynamic and characteristics,[26] or on structural analysis,[27] rarely combining the two in order to
obtain a more insightful understanding of the networks nature. The utilization of a relatively large dataset of
networks, as well as an amalgam of social network and contextual analysis, will hopefully enable the current
study to provide an improved understanding of the relation between networks structure and their output.

To understand the ways in which the structure of a terrorist network impacts its productivity and durability,
we must first determine what attributes we expect the structure to provide in order to facilitate operational
success. To begin with, a network should aim to maximize secrecy, thus allowing minimum exposure of
its members following an attack. At the same time, the structure should allow the network to maximize
its human resources, enabling effective coordination and communication. Finally, we would expect the

ISSN 2334-3745 40 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

structure to have a high level of resiliency to external attacks on the group. Hence, even elimination of some
members should not lead to the overall collapse of the network or to significant diminishing of its operational
capabilities.

The need to accomplish these objectives has led many to assume that clandestine, illegal networks must
balance between efficiency (high level of group centrality,[28] i.e., a strong hierarchy and a low number
of redundant ties) and robustness (high density,[29] i.e., a high number of redundant ties, low levels of
betweenness[30] among most actors, and a flat structure).[31] The former minimizes the chances of
the networks exposure because of the limited familiarity and ties between most of the groups members
(i.e., the capture or elimination of one actor should have a limited effect on the overall network). This also
enables the formulation of a more coherent operational vision, since the hub has effective control of most
communication channels (and an extremely high level of betweenness). However, the robustness and high
density ensures survival in cases when an actor with a high level of centrality is eliminated, since alternative
ties allow the network to maintain operational capabilities and coordination. Moreover, it seems that high
robustness facilitates effective indoctrination, a crucial element in the radicalization and socialization of
network members.[32]

The association between networks density, centrality and their outputs are examined in this study, as well
as the association with the networks tendency to adopt what some have suggested is the way (successful)
terrorist networks balance between centrality and density, i.e., adopting a structure that includes a clear
division into subgroups that maintain a minimal number of ties between them while having high levels
of density within (subgroups oriented structure), resulting in an organizational structure that minimizes
chances of entire group exposure (in many cases, the hubs subgroup serves as a barrier between the
different subgroups in order to prevent the creation of unnecessary redundant ties). The terrorist networks
survivability is increased without harming its ability to engage in effective indoctrination and high quality
attacks (which involved several subgroups). The fact that the subgroups in the terrorist networks are relatively
independent also allows the network to overcome internal ideological conflicts more easily, since each
subgroup has the prerogative to decide in which operations to participate or which targets to attack.[33]

But is the number of subgroups also important? And since, in some cases, this is a reflection of network size,
does the size of the network correlate with its productivity and durability? Potentially, a networks size and the
number of subgroups influence its ability to initiate parallel attacks or sophisticated ones, reflect recruitment
potential, and in general, affect operational and logistical flexibility. A particularly high number of cliques
(subgroups within the network where every member knows every other member) is associated with higher
levels of cohesiveness as well as facilitating coordination and resiliency when the network suffers from
elimination of actors (the higher the number of cliques, the higher the chances the surviving members will
have enough close and meaningful ties in order to preserve some of the network capabilities). On the other
hand, the bigger the network, the more points of contact it has with the environment and external elements,
thus augmenting chances of exposure. The association between the number of actors and subgroups and
a networks productivity and durability will be tested to ascertain whether an optimal size (which balances
these) can be detected.

If compartmentalization is important for the groups survival, it seems logical to assume that its effectiveness
depends on exactly who the actors are that are being divided. For example, effective separation between
the operational actors and the leaders, planners, and coordinators seems to have strong benefits in terms of
durability. It makes the latter less vulnerable, less guided by irrelevant considerations (peer pressure), and
ensures continuity even if operational failures lead to losing some operational actors. On the other hand,
concentration of all leaders in one subgroup can potentially harm the long-term survival of the network

ISSN 2334-3745 41 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

since if it is exposed and removedthe remaining members of the network are left with only attacks
already in the pipeline and without long term planning capabilities.

Finally, network scienceand especially the unique contributions of Laszlo-Barabasi and his associates[34]
have led some scholars[35] to assume that the number of hubs as well as free-scale structure may be
associated with the networks survivability. Scale-free structure ensures the resiliency of the network in cases
of a random attack, since the chances of elimination of highly connected actors is relatively low, and a high
number of hubs ensures that even if eventually one of the hubs has been targeted, other hubs will be able to
continue to coordinate the networks violent efforts.

To conclude, the universe of ideas regarding the ways that structure influences the operational output of
networks seems populated with contradicting perceptions regarding the importance of most structural
characteristics, as well as limited empirical evidence. The following empirical analysis will strive to provide a
more coherent understanding of the association between organizational structure and operational outputs.

Dataset and Methodology


The research hypotheses for this article were tested using a dataset containing social network mapping and
contextual data of 18 networks that were active during the years 1980-2006 in various political, cultural and
geographical settings.

Table 2 Networks Characteristics

Types of Groups Durability No. of attacks Region Ideology


(Months)
(attacks/durability)
Jewish Underground 46 4 (11.5) Israel/West Bank Religious/Radical-right
Morocco (late 1990s-2000) 44 22 (2) Morocco Religious
Istanbul 25 4(6.25) Turkey Religious
Samaria 25 12(2.08) PNA/West Bank Religious/Nationalist
Jenin 24 15(1.6) PNA/West Bank Religious/Nationalist
Hebron 24 11(2.18) PNA/West Bank Religious/Nationalist
Yemen 18 1(18) Yemen Religious
Bat Ayin 16 11(1.45) Israel/West Bank Religious/Radical-right
9/11 15 3(5) US Religious
Jordan (2000) 14 1 (14) Jordan Religious
1993 NY network 13 0 US Religious
Nablus 12 4(3) PNA/West Bank Religious/Nationalist
1993 Twin Towers network 12 1(12) US Religious
Hofstad 11 0(0)* Netherland Religious
Amir Network 9 1(9) Israel/West Bank Religious/Radical-right
London 9 1(9) UK Religious
Madrid 7 1(7) Spain Religious
Morocco (mid 2000s) 6 1(6) Morocco Religious
* The killing of Theo van Gogh, by one of the networks members, was more an individual act rather than part of the long-term plots of the group.
Even if we consider this event as an attack by the group, the latter will be still ranked at the bottom in of the list in terms of productivity.

Table 2 provides basic information regarding the networks included in the dataset. As can be seen, seven of
the networks were active in the West Bank and Israel. Four were Palestinian networks and the other three
were Jewish ones. While active in the same region, they were not operating in fully similar environmental

ISSN 2334-3745 42 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

conditions and were functioning during different time periods. Four other networks were active in European
countries, three in Western Europe and one in Turkey. The other networks were active on American
soil (three networks), other Middle Eastern countries (two networks) and Africa (two networks). The
composition of the dataset was based on information extracted from three main sources. The information
regarding the Jewish networks is based on two years of field research conducted between 2004-2005 in the
West Bank. This led to the creation of a Jewish terrorism dataset, which included mapping of the social
relations within the Jewish terrorist groups. Several recently published works[36] deciphering the dynamic
and social structures of these groups have already made use of this dataset. The Palestinian networks data
is based on the NSSCs (National Security Studies Center at the University of Haifa) Palestinian Terrorism
Dataset.[37] Finally, the data on the other networks was gathered in the framework of a two-year project
funded by the ISF (Israel Science Foundation), intended to analyze the operational and structural dimensions
of suicide bombers networks worldwide (ISF Grant 827/06). In all these three sources, both the contextual
information and the mapping of the networks was based on information extracted from an amalgam of open
sources including governmental reports, relevant news and academic articles, judicial proceedings, relevant
books, interviews with members of some of the groups, policymakers and representatives of law enforcement
forces.

Table 2 also includes measures of the networks productivity and durability. Since productivity refers to the
capacity of the network to produce violence consistently and frequently, it was measured by the networks
lifespan divided by the number of attacks it perpetrated. The question of durability however is more complex.
While traditionally the tendency of most terrorism datasets is to use the groups first attack as the starting
point for measuring their life spans as terrorist groups,[38] this could be somewhat deceiving. Social
networks are a byproduct of social settings; they are formed naturally in the workplace, between individuals
sharing residential areas and in familial frameworks. Under some conditions, these networks become
motivated networks, when the members agree on identifiable shared goals. Thus, terrorist networks do not
become ones during or after perpetrating their attacks, but when the members are beginning to move actively
towards accomplishing their goal of producing violence. In other words, the social networks radicalization
at some stage is reflected in the shift from ideas to practical activities leading to engagement in violence; at
that point, it is no longer a social network per se, but a motivated group with the goal of perpetrating terrorist
attacks. Based on this rationale, the durability of the networks was measured between the point in time its
members began actively planning and/or preparing their violent attacks until most of its members were
arrested or eliminated by the security authorities, or decided to end the networks violent campaign. As can
be observed in Table 2, there is some compatibility between the two variables. Of the six networks which
survived two or more years, four showed relatively high levels of productivity (one attack per 2-4 months),
and the rest were capable of producing multiple attacks. Of the four networks surviving less than a year, none
produced multiple attacks and all needed between half to a full year at least for producing their single attack.
In the following sections, a comparative analysis will explore whether high or low productivity and durability
are a result of specific environmental or structural characteristics.

Findings: Environmental Factors


Table 3 provides a summary of the environmental conditions under which the different networks operated,
as well as their productivity and durability. To facilitate the analysis and the observation of trends in the data,
the networks were organized in descending order based on their productivity. As illustrated here, the most
important environmental factor influencing the networks operational output seems to be communal support
for the networks activities. Seven of the eight most durable networks and the top five networks in terms of

ISSN 2334-3745 43 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

productivity were active within supportive communities.

Table 3 Environmental Factors

Network Durability Productivity Governments Community Access to Access to Access to


tolerance CT funding operational potential
Measures knowledge recruitment
sources
Bat Ayin 16 11(1.45) O-C O C O O
Jenin 24 15(1.6) H O O O-C O
Morocco (late 1990s-2000) 44 22(2) C O-C O O O
Samaria 25 12(2.1) C-H O O O-C O
Hebron 24 11(2.18) H O O O-C O
Nablus 12 4(3) C C-H O C C
9/11 15 4(3.75) C-H C-H O-C O-C O-C
Morocco (mid 2000s) 6 1(6) C C-H C O C
Istanbul 25 4(6.25) H C-H C O O-C
Madrid 7 1(7) C-H C-H O C C
Amir Network 9 1(9) C C-H H O-C O-C
London 9 1(9) H H C-H C C
Jewish Underground 46 4(11.5) O O C O O
1993 Twin Towers network 12 1(12) C- H C- H O-C O-C C
Jordan (2000) 14 1-3(4.6) O-C C-H C O C
Yemen 18 1(18) O-C O-C O O C
1993 NY network 13 0 C- H C- H C C-O O-C
Hofstad 11 0(0) H C- H C-H C-O O-C
O Optimal; C- Challenging; H-Hostile

Looking specifically at the differences between networks active within the same arena further supports
this conclusion. The three Palestinian networks active during the years 2000-2004 in the West Bank (Jenin,
Samaria, Hebron; for more in-depth information about the networks see also Pedahzur and Perliger, 2006)
[39] operated during the Second Intifada, within a highly dense Palestinian population that greatly supported
the suicide attacks campaign initiated by these networks. While the data are not always consistent over time,
public opinion polls show that 60-70% of the Palestinian population supported a violent struggle, believing
that it was more efficient in ending the Israeli occupation than peaceful negotiations. Moreover, attacks
against settlers and soldiers were supported by almost 90% of the Palestinians, and in general, around 80%
rejected any punishments for activists in terrorist networks.[40] Similar findings were obtained when the
polls inquired about the level of support for specific suicide attacks initiated by the Palestinian networks (for
example, 75% supported the suicide attack at Maxim Restaurant initiated by the Jenin network).[41] In some
cases the popularity of the suicide attacks transformed them into prominent mobilization mechanisms in
the competition for popular support among the different networks.[42] In accordance with the theoretical
logic presented earlier, the only Palestinian network which operated in a much less supportive environment
(the Nablus Network, which was active in the city of Nablus in 1996), was also significantly less durable
and productive in comparison to the aforementioned three other Palestinian networks. In Nablus itself, the
base of operations of the network, less than 30% of the population supported any kind of violent anti-Israeli
operations.[43] Furthermore, we can find in 1996 a high level of support for the negotiations between Israel
and the Palestinian National Authority (PNA) (75%), and for the peace processes in general (68%). Even after
the victory of the Israeli right in the May 1996 Israeli general elections, and the appointment of Benjamin

ISSN 2334-3745 44 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Netanyahu as Prime Minister, the support for violent attacks did not exceed the 40% mark.[44]

The case of the Jewish networks further provides support for the importance of communal support. The two
more durable (especially the Jewish Underground) and productive (especially the Bat Ayin network)
Jewish networks enjoyed significant support from within the settler community (both networks were based
in West Bank settlements) as well as from their representatives in the political system. This was reflected
not only by the supportive response of large parts of the settler community during and after the exposure
of the networksincluding mass demonstrations, rallies and petitions against any attempt to assume harsh
punishments against the networks members[45]but also in surveys conducted during the periods of the
networks activity showing strong support in the settlers community for violent acts of self-defense by Jews
and for the release of the networks members (60% among the entire Jewish population and 75% among the
settlers)[46]. This support and understanding for the networks actions is illustrated effectively by the words
of an Israeli settler after one of the Jewish Underground attacks (as he was quoted by an Israeli journalist):
Since the attack, you can feel the joy here [in the settlements]its about time that the Arabs were repaid for
their deeds.[47]

In contrast, the Amir network, which was neither particularly productive nor durable, was mostly situated
geographically in a more neutral area (the city of Herzliya, one of the more liberal and secular cities in Israel).
[48] Moreover, the ideological core ideas of the network, which focused on the need to eliminate the Israeli
Prime Minister, were much less consensual than the type of ideology and attacks initiated by the two previous
networks.[49] Essentially, the Amir network was interested in assassinating an Israeli, who was practically
a war hero, and although he was despised by many on the Israeli right, there are indications that very few
supported the actual assassination.[50] This was reflected in the inability (or difficulty) of the network to
obtain a spiritual approval for its plans from the settlers religious leadership,[51] or to expand beyond its
core founding clique, although some members had access to significant recruitment resources (such as
the students union at Bar-Ilan University).[52] In contrast, the other two networks targeted Palestinians,
direct adversaries of the settlers population, and acted during times of violent clashes between the two
communities (the early 1980s and the second Intifada).

Besides the networks operating in the West Bank/Israel, two other networks showed high levels of durability
(the Istanbul network) and productivity (Morocco 1998-2002). Both were active in relatively challenging,
but not completely hostile communal environments within moderate Muslim countries (Morocco and
Turkey). The Moroccan network, lasting for almost four years, was based mainly in the orthodox Hay El
Oulfa neighborhood of Casablanca, which is known for its poverty, lack of governmental presence and
hostility towards authorities. Moreover, one of the networks leaders, Mohamed Damir, was a prominent
figure in the neighborhood (basically a social leader).[53] Hence, while not an optimal environment like
those mlieus enjoyed by the Palestinian or Jewish groups, it still provided a relatively safe haven for the
network, which was not hesitant about eliminating governmental representatives who challenged its control
of the neighborhood.[54] Furthermore, the relatively low-key nature of the networks operationsmainly
assassinations against those who showed Western tendencies and non-Islamic behavior or crime-related
activitiesfacilitated more supportive attitudes from the immediate surrounding environment of the
network, and contributed to the limited and delayed governmental response. The Istanbul network was not
highly productive, but it was durable. It seems that there are a few elements that can explain the ability of
the network to overcome the relatively challenging communal environment. The first is the external logistic
and financial support, which limited the need to resort to communal support, as well as the fact that for
significant periods of time members of the group were not physically present in Istanbul.[55]

In contrast, governmental attitude seems to have limited influence on the operational capabilities of the

ISSN 2334-3745 45 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

networks. Some of the more durable and productive networks have confronted a hostile regime (Hebron,
Samaria, Jenin, Istanbul) while some of the networks active in more convenient environments in terms of
governmental response or awareness (Nablus, Yemen, Amir Network, Jordan) were not really productive or
particularly durable. Nonetheless, government response has some influence on the durability of networks;
none of the networks enjoying permissive political environments was categorized in the lower third in terms
of durability.

Lastly, findings regarding the association of operational success and access to funding, recruitment resources
and operational knowledge are less consistent. Of the three, access to recruitment resources seems most
associated with operational success. This is not surprising as it is somewhat correlated with the level of
communal support. Eight of the ten most durable networks and seven of the ten most productive networks
had optimal, or close to optimal access to recruitment resources. However, two-thirds of the networks
included multiple members with military training (although not always of the highest quality, and one
was not engaged in operations which demanded military training), while the other third included at least
one actor with such expertise. Hence, it seems that operational knowledge is more a pre-condition for the
emergence of the network than a factor influencing its durability or productivity. Lastly, funding appears
to be associated on some level with durability; six out of the ten most durable networks enjoyed optimal
funding, and four of the five least durable suffered from limited funding. This tendency is somewhat less
prominent when looking at productivity; while six of the seven more productive networks enjoyed optimal
funding, a high level of funding could also be found in some of the less productive networks.

Findings: Structural Factors


Naturally, the size of the dataset prevented the use of advance statistical analyses. Nonetheless, some trends
are detectable when looking at the association of structural characteristics with the operational success of
the networks. In the theoretical framework, the need for clandestine networks to balance between centrality
and density was emphasized. Escalating to extreme levels of either one can potentially decrease the networks
survivability and productivity. Indeed, the analysis of the networks social structure provides some support
for this hypothesis (see Table 4).

ISSN 2334-3745 46 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Table 4 Structural Characteristics

Networks Networks Clustering Size No. of Free No. of Size/


Centrality Density Coefficient Hubs Scale (%) Cliques No. of
Cliques
Bat Ayin 30.667 1 0.622 16 0 40 12 1.333
Jenin 21.209 1.122 0.705 49 3 48.5 118 0.415
Morocco (late 13.737 1.296 0.713 24 2 56 5 4.8
1990s-2000)
Samaria 32.435 1.107 0.991 36 4 50.6 24 1.5
Hebron 33.088 1.64 1.06 36 2 31.6 75 0.48
Nablus 21.013 1.173 0.997 22 1 32.3 8 2.75
9/11 36.565 2.782 1.04 20 0 37.7 0
Morocco (mid 25.271 1.414 1.121 41 4 46.3 10 4.1
2000s)
Istanbul 39.369 1 0.659 28 6 49.7 13 2.154
Madrid 8.031 1.903 1.23 69 15 52.3 18 3.833
Amir Network 52.381 0.767 1.385 8 1 42.1 2 4
London 19.407 1.274 0.739 16 1 38.3 6 2.667
Jewish 36.097 2.763 2.038 29 4 45.8 14 2.071
Underground
1993 Twin 59.439 2.688 1.844 15 1 40.6 5 3
Towers
network
Jordan (2000) 20.333 1.708 1.343 11 0 35.4 3 3.667
Yemen 31.556 1 0.465 16 0 40.6 4 4
1993 NY 66.272 2.625 1.901 14 1 36 6 2.333
network
Hofstad 12.628 1.464 1.017 29 6 48.7 15 1.933

All of the more productive networks except for one (eight of the nine networks that produced multiple
attacks, as well as the mid-2000s Morocco network) have a group centrality level of 20-40%, some of them
very close to the overall sample average level of centrality (31.08). When looking at the networks that were
one-hit wonders the picture is significantly more varied. The less durable networks tend to slide into the
extremes of very low network centrality (Madrid, Hofstad) or very high network centrality (1993 WTC
network, Amir Network). More specifically, the first group of networks average centrality is 28.1 with a
standard deviation of 8.37 (29.7%) while in the second group the average centrality is 34 with SD of 21.11
(62%). This trend is visible also when looking at durability. The variance in groups centrality among the ten
less durable networks (21.6) is significantly higher than the variance among the nine most durable networks
(8.10). This supports the view that successful networks balance between the need to develop some level
of centralization (mechanism which allows them to preserve a cohesive vision and consensus around
the networks goals, as well as for coordination), and the need to prevent it from becoming an obstacle to
organizational flexibility and a potential vulnerability (in cases of penetration and/or elimination of central
actors or subgroup).

The findings are less consistent when examining networks density. In general, however, density is lower
among the more durable and productive networks. The nine more productive networks (those that produced
multiple attacks and the mid-2000s Morocco network) had an average density level of 1.39 (.56SD) and only

ISSN 2334-3745 47 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

one of them had a density level higher than 1.7. The findings are similar when examining the association
between networks density and durability. The density of seven out of the eight more durable networks was
under 1.7, while five out of the other ten (less durable networks) had a density higher than 1.7. The former
group of networks average density was 1.3 (.60SD), in comparison to 1.7(.70SD) in the latter group. The
findings might reflect that in the dilemma between inflating the number of redundant ties (in order to foster
resilience) and, on the other hand, the need to create a more compartmentalized structure with limited
redundant ties, the latter structure is more effective in enhancing operational success.

As indicated earlier, some students of terrorist networks perceive the subgroups oriented structural formation
as a preferable solution for overcoming the contradictory needs of clandestine networks, and for balancing
between robustness (density) and centrality. The findings do not provide support for this contention but
actually seem to support the opposite view. In order to assess the closeness of the networks to subgroups
oriented structure, the weighted overall clustering coefficient [56] of each network was measured. In
general, the more durable and productive networks showed lower levels of clustering. Except for the Jewish
underground network, all the eight leading networks in terms of durability possessed clustering coefficients
of below 1 or close to it, while in the eight less durable networks all but one possessed clustering coefficients
of above 1, and some close to 2. This tendency is more prominent when looking at the association between
clustering coefficient and productivity; all of the networks perpetrating multiple attacks held clustering
coefficients of between 0.62 and 1.22 (average of 1.1), while seven of the nine one hit wonders (and the
Hofstad group) had a clustering coefficient level higher than one (average of 1.5).

However, while subgroups-based structure is not optimal in terms of durability and productivity, this
does not mean that the existence or number of sub-groups are not an important factor in determining the
networks operational success. The findings suggest that the relative (to the groups size) number of cliques
within a network is highly associated with both durability and productivity. Among the nine more productive
networks (as defined earlier) the average level of clique proportion (number of cliques divided by the network
size) was 1.94 (the smaller the number, the higher the proportion of cliques in terms of network size) in
comparison to 3.05 among the less productive networks. While the sample size is not optimal, ANOVA
analysis confirmed the statistical significance of the gap between the two groups (F=3.158*). The same
finding, although somewhat weaker, could be seen when viewing the relationships between durability and
number of cliques (2.09 level of cliques proportion among the durable networksi.e., surviving more than a
yearversus 2.89 among the less durable networks).

Finally, while no visible association was found between tendencies toward scale-free structure or number
of hubs and operational success, it seems that size is important. The more productive and durable networks
include more than 20 members (except for the Bat-Ayin network). Among the less productive networks (the
one-hit wonders) we can find a relatively high portion of networks with fewer than 20 members (Amir
network, London network, Jordan network, Yemen, and both 1993 NY networks; the Hofstad and the Madrid
networks are the exceptions).

Conclusion
Homegrown and relatively independent terrorist networks do not survive for long. Just two of the networks
analyzed in this study survived in practice for more than two years, and none of them exceeded the five-year
mark. Nonetheless, some of the networks were clearly more successful than others. Is it possible to portray
the main characteristics of a successful terrorist network? The findings presented above provide at least a
starting point for discussion. To begin with, the operationally effective networks generally operate within

ISSN 2334-3745 48 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

supportive and homogeneous communities, tolerant of the violent struggle. Under these conditions, the
social frameworks of the community become effective and accessible recruitment resources. Hence, while in
most of the networks, the core subgroup is based on family ties or other primary social ties, the operational
capabilities and longevity of the networks are determined by their success in expanding the core primordial
social network and using the recruitment resources to expand the network, build potential new subgroups (in
most cases these subgroups are social networks which were formed within the original recruitment resources,
such as educational institutions, religious establishments, residential neighborhood and others) and recruit
potential perpetrators (in the case of the more durable suicide attacks networks, using mostly marginal
actors for operational reasons; see more in Pedahzur and Perliger, 2006).

Less encouraging is that the findings suggest that the level (and types) of counter-terrorism measures
employed by the state do not have a consistent impact on the productivity or durability of networks.
Nonetheless, since the networks operated in different time periods and in different regions, it is difficult to
draw conclusions from the findings regarding the current capabilities of Western democracies in countering
homegrown networks. In addition, the findings of course do not consider the many networks which never
materialized as a result of counter-terrorism policies or operations. The findings also suggest that perhaps the
answer is in focusing counter-terrorism measures on prevention of proliferation of material and operational
capital. While funding and operational knowledge/training are not strong predictors of operational success,
they appear to be potential preconditions for the formation of the networks and for networks shift from
ideological radicalization stage to the operational/behavioral stage.

When looking at the structural characteristics that differentiate the successful from the less successful
networks, it seems that the most important elements are the ability of the successful networks to balance
effectively between cohesiveness and flexibility while preserving their dynamic nature. Successful networks
obtain enough hierarchy (level of centrality) to ensure effective coordination and cohesive operational vision,
and on the other hand, provide enough freedom and flexibility to its members and subgroupsa practice
which ensures survival when some parts of the network become dysfunctional. Successful networks are also
potentially highly dynamic. They have a relatively high portion of overlapping cliques, and each member is
affiliated to several cliques. Thus, when the network is under strain, even if some complete subgroups have
been eliminated or isolated, the remaining members have the potential to form alternative subgroups. This
also explains the absence of small world structure among the successful networks, as this actually limits the
number of potential subgroups or cliques the single member can be affiliated with. Moreover, the existence of
a high portion of overlapping cliques reflects the capability of a successful network to effectively integrate the
subgroups recruited from the different recruitment resources.

The current study represents an exploratory attempt to provide some insight into the factors influencing
terrorist networks durability and productivity, by looking at the structure and characteristics of a relatively
high number of networks originating and operating in different settings. While this study is one of the
first to implement a comparative approach for the investigation of terrorist networks, some limitations
should be kept in mind when evaluating the findings. First, some of the networks analyzed could be seen as
sleeper cells rather than authentic independent or homegrown networks, mainly the 9/11 and the Yemen
networks. Although these two networks included local members, it could be argued that their success or
failures were related to their type and nature of ties to AQ central. Nonetheless, even the omission of these
networks could not have significantly changed the main findings. Another problem is a great difficulty in
assessing the exact level of support for the different networks within the surrounding community. This
is especially true when dealing with networks that existed for short periods of time. Finally, mapping the
social networks of the different terrorist networks is based on a static snapshot of the networks structure.

ISSN 2334-3745 49 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Although in some of the networks, there is evidence that limited changes occurred over time (e.g., the
Amir Network, or Palestinian networks), it could be assumed that this was a limitation in some of the more
dynamic networks structure-wise.

The current research points out several promising paths for future research. These include more deeply
studying the interplay between environmental and internal factors contributing to the productivity and
durability of terrorist networks and looking at indicators of dynamic structure as potential predictors of
durability. Another important future path for research is extending the theoretical framework on productivity
and durability to a new spectrum of violent groups to include cults and networks that are part of a larger
social movement (e.g., ELF, Neo-Nazi groups etc.). Finally, and perhaps most important, there is a need
to consider the role of ideology in the outputs of terrorist networks. To illustrate, can we identify specific
relationships between operational patterns and ideological objectives, which eventually also impact on the
durability and productivity of terrorist networks? Are some ideological goals actually more prone to short
term campaigns and limited violence? The answers to these questions can clarify whether or not maximizing
productivity and durability are constant across ideological lines or not.

About the Author: Arie Perliger is the Class of 1977 Director of Terrorism Studies at the Combating Terrorism
Center and Associate Professor at the U.S. Military Academy at West Point.He has published widely on issues
related to terrorism and political violence, security, Middle Eastern politics, the far right in Israel, Europe and the
U.S., and the applicability of social network analysis to the study of social phenomena.

Notes
[1] Laqueur, Walter. The New Terrorism. Fanaticism and the Arms of Mass Destruction. New York: Oxford University Press, 3-7 (1999); Kurz, Anat, New Terrorism:

New Challenges, Old Dilemmas, Strategic Assessment, 6(2), Jaffe Center: Tel Aviv (2003).

[2] Hoffman, Bruce, Al Qaeda, Trends in Terrorism, and Future Potentialities: An Assessment, Studies in Conflict & Terrorism, 26, 429-442 (2003); Mayntz, R,

Hierarchy or network? On the Organizational Forms of Terrorism, Berliner Journal fr Soziologie 14 (2): 251 (2004); Raufer, Xavier, Al Qaeda: A Different

Diagnosis, Studies in Conflict & Terrorism, 26, 391-398 (2003); Sageman, Marc, Understanding Terror Networks. Philadelphia: University of Pennsylvania Press

(2004); Pedahzur, Ami and Perliger, Arie, The Changing Nature of Suicide Attacks: A Social Network Perspective. Social Forces 94 (4): 1983-2004 (2006).

[3] See for example Brams, J. Steven, Mutlu Hande, and S. Ling Ramirez, Influence in Terrorist Networks: From Undirected to Directed Graphs, Studies in

Conflict & Terrorism 29: 7031 (2006); Carley, M. Kathleen, Ju-Sung, Lee and Krackhardt, David, Destabilizing Network, Connections 24 (3): 7992 (2002); Carley,

M. Kathleen, Diesner Jana, Reminga Jeffrey and Tsvetovat Maksim, Toward an Interoperable Dynamic Network Analysis Toolkit, Decision Support System, 43:

1324-1347 (2006); Krebs, E. Valdis, Mapping Networks of Terrorist Cells, Connections 24 (3): 4352 (2002); Koschade, Stuart, A Social Network Analysis of

Jemaah Islamiyah: The Applications to Counterterrorism and Intelligence, Studies in Conflict & Terrorism 29 (6): 55975 (2006); Perliger, Arie and Pedahzur, Ami,

Social Network Analysis in the Study of Terrorism and Political Violence, Political Science and Politics, 44(1): 45-50 (2011); Rodriquez, A. John, The March 11th

Terrorist Network: In Its Weakness Lies Its Strength, XXV International Sunbelt Conference, Los Angeles, February 1620 (2005).

[4] For a review of the relevant literature seePerliger and Pedahzur, 2011; Stohl, Cynthia and Stohl Michael, Networks of Terror: Theoretical Assumptions and

Pragmatic Consequences Communication Theory, 17: 93124 (2007).

[5] Koschade, 2006; Sageman, 2004; Sageman, Marc, Leaderless Jihad. Philadelphia: University of Pennsylvania Press (2008); Rodriguez, 2005; Rothenberg, Richard,

From Whole Cloth: Making up the Terrorist Network, Connections 24 (3) 36-42 (2002).

[6] Myntz, 2004.

[7] Powell, Walter W., Neither Market nor Hierarchy: Network Forms of Organization, Research in Organizational Behavior 12: 295336 (1990); Thompson,

Grahame, et al. (Eds.), Markets, Hierarchies and Networks. The Coordination of Social Life. London: Sage (1991).

[8] Axelson, Bjrn and Geoffrey Easton (Eds.), Industrial Networks. A New View of Reality. London: Routledge (1992); Marin, Bernd and Renate Mayntz (Eds.),

ISSN 2334-3745 50 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Policy Networks: Empirical Evidence and Theoretical Considerations. Frankfurt a.M.: Campus (1991); Hollingsworth, J. Rogers, Philippe C. Schmitter and Wolfgang

Streeck (Eds.), Governing Capitalist Economies: Performance and Control of Economic Sectors. New York: Oxford University Press (1994).

[9] Stohl and Stohl, 2007.

[10] Pedahzur and Perliger, 2006; Carley et al. 2002.

[11]Myntz, 2004.

[12] Weinberg, Leonard, Pedahzur Ami and Perliger, Arie, Political Parties and Terrorist Groups. New York: Routledge (Second edition, 2008).

[13] Helfstein, Scott,Governance of Terror: New Institutionalism and the Evolution of Terrorist Organizations, Public Administration Review, 69(4): 727-739

(2009).

[14] Koschade, 2006.

[15] Pedahzur, Ami and Perliger, Arie, Jewish Terrorism in Israel, New York: Columbia University Press (2009).

[16] Vidino, Lorenzo, The Hofstad Group: The New Face of Terrorist Networks in Europe, Studies in Conflict and Terrorism 30: 579-592 (2007).

[17] Abrahams, Max,Why Terrorism Does Not Work, International Security, 31(2): 42-78 (2006).

[18] Crenshaw, Martha, The Causes of Terrorism, Comparative Politics 13 (4): 37999 (1981).

[19] See for example Abrahams, 2006; Crenshaw, 1981; Cronin, K. Audrey, How Terrorism Ends: Understanding the Decline and Demise of Terrorist Campaigns. NJ:

Princeton University Press (2009); Ganor, Boaz, The Counter-Terrorism Puzzle: A Guide for Decision Makers. New Brunswick, N.J.: Transaction (2005); Pedahzur

and Perliger, 2006, 2009; Sageman, 2004, 2008; Takeyh, Ray and Gvosdev, K. Nikolas. Do Terrorist Networks Need a Home?, The Washington Quarterly, 25(3):

97-108 (2002).

[20] Scale-free networks include regular actors with an average number of ties as well as several actors who have well above the average. In this type of network,

we can assume that the structure is growing due to the hubs activity and his or her abilities to create new ties and expand the network (SeeLaszlo-Barabasi and

Bonabeau 2002).

[21] Brams et al, 2006; Carley et al, 2002, 2006; Helfstein, Scott and Wright, Dominic. Forthcoming. Covert or Convenient? Evolution of Terror Attack Networks,

Journal of Conflict Resolution, 55(5): 785-813 (2011); Krebs, 2002; Koschade, 2006; Perliger and Pedahzur, 2006, 2009, 2011; Rodriquez, 2005.

[22] Berohn Jonathan, Randall Blimes, and Mewhinney Erin, Slaying the Hydra: Recruitment and Terrorist Group Duration, Paper presented at the annual meeting

of the Midwest Political Science Association, Palmer House Hilton, Chicago, Illinois, Apr 07, 2005; Cronin, 2009, 26, 104-110; Hamm, S. Mark, Terrorist Recruitment

in American Correctional Institutions: An Exploratory Study of Non-Traditional Faith Groups, National Institute of Justice/NCJRS (2007); Gendron, Angela,

Trends in Terrorism Series: Al-Qaeda: Propaganda and Media Strategy. ITAC Presents Vol. 2007-2 (2007); Sageman, 2004, 107-125.

[23] Adams, James, The Financing of Terror. New York, Simon & Schuster (1986); Brynjar, Lia and Kjk Ashild, Islamist Insurgencies, Diasporic Support Networks,

and Their Host States: The Case of the Algerian GIA in Europe 1993-2000. Norwegian Defence Research Establishment (2001); Fair, C. Christine and Shepherd,

Bryan, Who Supports Terrorism? Evidence from Fourteen Muslim Countries. Studies in Conflict and Terrorism 29:51-74 (2006); Giraldo, Jeanne and Trinkunas,

Harold, The Political Economy of Terrorist Financing. In Giraldo and Trinkunas, (Eds.), Terrorist Financing and State Response. Stanford, C.A.: Stanford University

Press, Ch. 1 (2006).

[24]Alimi, Eitan Y.,The Israeli Political Arena and Palestinian Contention: The Case of the First Intifada, British Journal of Political Science (37): 433-453 (2007);

Bloom, Mia, Palestinian Suicide Bombing: Public Support, Market Share and Outbidding. Political Science Quarterly 119 (1): 61-68 (2004); Cronin, 2009, p.32;

Sageman, 2004; Pedahzur and Perliger, 2006.

[25] See for examplePedahzur and Perliger, 2006four Palestinian networks; Helfstein and Wright, 2011 six Islamic networks, mostly from South East Asia; Yang

and Sageman, 2009 two Islamic Networks, which were active in the U.S.

[26] Vidino, 2007.

[27] Krebs, 2002.

[28]Degree centrality of an individual actor is the ratio of each actors actual ties to his potential ties (Freeman, Roeder and Mulholland 1980), or simply put, the

level of is connectedness to other actors. The concept of group centrality in this article reflect the tendency of the group to adopt a star network in which the

ISSN 2334-3745 51 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

majority of the actors are connected to one member (hub) while have limited ties between themselves (Wasserman and Faust, 1994 chapter 5).

[29] Density is usually defined as the sum of the values of all ties divided by the number of possible ties. That is, with valued data, density is usually defined as the

average strength of ties across all possible (not all actual) ties within the network (Freeman, Roeder and Mulholland 1980).

[30] Betweenness assists in identifying those actors who connect between subgroups or lone actors within the network (Borgatti 2005:59-60).

[31]] Helfstein and Wright, 2011.

[32] Pedahzur and Perliger, 2009.

[33] Pedhazur and Perliger, 2009.

[34] Laszlo-Barabasi, Albert, and Eric Bonabeau, Scale-Free Networks. Scientific American 288(5):60-69 (2003).

[35] Helfstein and Wright, 2011.

[36] Pedahzur and Perliger, 2009.

[37] Seehttp://nssc.haifa.ac.il/profile.htm.

[38] See for example: Cronin, 2009.

[39] Pedahzur and Perliger, 2006.

[40] See for example: http://www.pcpsr.org/survey/polls/2001/p3b.html;http://www.pcpsr.org/survey/polls/2002/p5a.html; NSSC datasets. In some surveys two

questions were presented support in terrorism and support in armed attacks. Naturally, the latter enjoyed higher levels of support, reflecting that while refusing to

call it terrorism, still the majority supported the armed struggle.

[41] See http://www.pcpsr.org/survey/polls/2003/p9a.html.

[42] See Bloom, 2004; Pedahzur and Perliger, 2006.

[43] See http://www.pcpsr.org/survey/cprspolls/96/poll22c.html#suparmed.

[44] See http://www.pcpsr.org/survey/cprspolls/96/poll22b.html;http://www.pcpsr.org/survey/cprspolls/96/poll24b.html;http://www.pcpsr.org/survey/cprspolls/96/

poll25a.html.

[45] For a full review see Pedahzur and Perliger, 2009.

[46] Periger, Arie, Factors Shaping CT Policies. PhD Dissertation submitted to the University of Haifa, January 2007; Litani, Yeuda, In Issue of Tactics, Haaretz,

June 22 1984, pg. 15 (Hebrew); Shragai, Nadav, How to release members of a Jewish Underground, Haaretz, June 23, 1989, pg. B2.

[47] Shibi, Haim. 9.6. 1980. In Kiryat Arba the people started whispering, Yedihot Acahronot Daily News, June 9, 1980, pg. 9 (Hebrew).

[48] Pedahzur and Perliger, 2009.

[49] Ibid.

[50] Ibid.

[51] Periger, Arie. 2007; Pedahzur and Perliger, 2009.

[52] Pedahzur and Perliger, 2009.

[53] BBC News, Morocco: Security forces arrest six members of Salafia Jihadia More Details. August 7, 2002.

[54] Ibid.

[55] Turkey Arrest Man for Blast.Turkey News (December 16-22, 2003).http://www.tusiad.us/specific_page.cfm?CONTENT_ID=414, Accessed on June 4, 2007.

4:20 P.M; Mary Fitzgerald. On the Pathway to Terror. The Irish Times, September 29, 2006; Vick, Karl. Inside an al-Qaeda-Linked Terrorist Attack. Washington

Post Foreign Service, February 14, 2007.

[56] This SNA methodological tool assesses the networks tendency to develop dense local neighborhoods, or clustering. The weighted version gives weight to

the neighborhood densities proportional to their size; that is, actors with larger neighborhoods get more weight in computing the average density.

ISSN 2334-3745 52 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

II. Research Notes

The Importance of Financing in Enabling and Sustaining the Conflict in Syria


(and Beyond)
by Tom Keatinge

Abstract
The availability, sources, and distribution of funding are critical issues to consider when seeking to address an
on-going conflict such as the one we are witnessing across Syria and Iraq. In the Syrian case, whilst funds from
states such as Russia, Iran, the U.S., Saudi Arabia, and Qatar support various elements, a key factor to consider
in addressing extremist groups is funding provided by private donors, some of whom are attracted by the concept
of jihadi finance, seeking the honour and reward of waging jihad by proxy. This article reviews the importance
of financing for insurgent groups, focusing in particular on the highly influential enabling role played by private
donor financing in the current conflict in Syria, as well as the sustaining role of the war economy as the conflict
spreads. Finally, it considers whether, in its fourth year, this conflict can still be influenced by targeting sources of
financing.

Keywords: Terrorism finance, Syria

Introduction

The Syrian conflict has drawn support in the form of weapons, spare parts, supplies, and fighters from across
the globe. But most importantly, the conflict has been enabled by the ready and generous supply of financing
provided by a broad array of states and private individuals and it is sustained by the development of a highly
lucrative war economy. It is thus not an exaggeration to say that financing is extremely important to all
parties in the conflict, and that the availability of financing has substantially influenced the course the conflict
has taken thus far.

Perhaps more so than in any other recent conflict, financing from private individuals, believed to run into the
hundreds of millions of dollars,[1] has played a major role in support of rebel groups, shaping their actions,
alliances, and agendas. Private donor financing is attractive for rebel groups as it often comes with limited
associated conditions beyond the need to espouse an appealing and attractive ideology often tending toward
the more extremist. This financing is particularly important for groups with no access to the largesse of those
Middle Eastern and Western states that have chosen to back the less extreme elements amongst the rebel
forces. And as long as the Assad regime receives supplies of fighters, weapons, spare parts, and finance from
Russia and Iran,[2] the level of financial support received by the rebel groups needs to balance that if they are
to have any chance of prevailing.

Furthermore, as the conflict matures and spreads across the border into Iraq, and as regional governments
and international agencies seek to control and restrict external sources of financing, the emergence of the
war economy is playing an important supplementing role. Taxation and trade, such as the sale of oil, allows
groupsparticularly the newly-styled Islamic State (IS)to establish a significant level of self-reliance and
financial autonomy. Thus, regardless of the source of the financing that fuels the conflict, as it grinds through
a fourth year, its outcome will be substantially determined by the continuing supply of funding.

In assessing the importance of financing in both sustaining and restricting the conflict in Syria, this Research

ISSN 2334-3745 53 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Note will first review the importance of raising finance in any armed conflict, a process that has become
more challenging for non-state actors in the past 25 years since the end of the Cold War. This discussion
will then examine the sources of support and financing for the Syrian conflict with a focus on the significant
contribution of private donors, including the key enabling role played by Kuwait along with the critical
motivational factor of financial jihad. As the shape of the conflict has evolved and as the battle has matured
and extended across the border into Iraq, the importance of the war economy as a sustaining factor has
increased. It is thus essential to consider this development as a key element in the financial balance between
the various warring factions. And finally, this Research Note will consider whether disrupting or controlling
the flow of finance can have a material impact on the shape and direction of a conflict that has no discernible
end in sight.

The Importance of Financing


The belief that financing is an important ingredient of any struggle is certainly not new in his series of
Philippic speeches the Roman orator Marcus Tullius Cicero (106 BC 43 BC) observed that The sinews
of war [are] a limitless supply of money.[3] Since the end of the Cold War the extent to which groups
seeking to mount a meaningful armed struggle have had to raise funding themselves rather than rely on
benevolent state sponsorship has markedly increased. With the notable exception of Hezbollah through its
connection with Iran, organisations seeking to progress from a hand-to-mouth existence to a more planned
and organised model must now work much harder to acquire the income required to source arms, build
recognition, and sustain support.[4] Even those groups that have enjoyed a measure of state sponsorship
have had to be financial managers as well as military experts. For instance, in the mid-1970s the Italian
Red Brigades had an annual funding need of US$ 8-10 million, equivalent at that time to the turnover of a
medium-to-large-sized company operating in Northern Italy,[5] whilst the PLO established itself as a quasi-
state, levying taxes and earning as much as US$ 600 million per year by the mid-1980s.[6]

Finance is an existential determinant of success as it creates the enabling environment that allows states to
arm themselves and opposition groups to mount a credible, threatening, planned, and organised strategy. The
importance of funding can be seen in the extent to which financing and fundraising capabilities are at the
heart of the operations of insurgent and opposition groups as they closely protect their key financiers, roles
often held by fighters who are imported or who have notable international experience. Their significance is
also reflected in the effort put into apprehending or eliminating these individuals by security agencies.

Well-funded groups in the Syrian conflict share key characteristics. They can generally act independently,
progressing their own or their donors ideology and developing patronage networks, particularly across
the Middle East. They can more easily attract fighters, particularly those who are unemployed and without
money. Finance may also allow them to poach fighters from less well-funded groups. Thus, well-funded
groups are able to benefit from a reinforcing cycle that gives them the strength of numbers and weapons to
target and control financially strategic hubs in order to maximise their benefit from the war economy, leading
to further benefits as they increase their financial resources. And, perhaps of greatest concern to international
security services, well-funded groups most often espouse a hard line ideology.[7]

In short, financing has played a dominant role in shaping and sustaining the Syrian conflict, as state-
sponsorship from Iran and Russia maintains the Assad regime, while external financing determines the
modus operandi of rebel forces, driving alliances, splits, and ideologies. Furthermore, the availability and
sources of financing impact on strategy. Forces are deployed to target or protect revenue opportunities such
as oil fields, key arterial roads and centres of commerce: for example, witness the tactical success of IS and its

ISSN 2334-3745 54 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

rapid territorial gains. The conflict in Syria has lasted over three years because of the availability of financing,
so restricting these funds is a major key to ending the conflict. Certainly President Obama was of this view
when he noted in his January 2014 New Yorker interview that our best chance of seeing a decent outcome
at this point is to work with the state actors who have invested so much in keeping Assad in power mainly
the Iranians and the Russians as well as working with those who have been financing the opposition.[8]

Sources of Financing (and Support)


The key sources of rebel financing and support include state sponsorship from Saudi Arabia, Qatar, Turkey,
the West, and Israel, strongly supported by private donors from across the Middle East.[9] Saudi Arabia and
Qatar are the main financiers, with Qatar also providing payments to defectors as well as significant media
support via al-Jazeera.[10] Although Turkeys previously robust support for the overthrow of Assad is fading,
fighters, weapons, and supplies continue to cross its border into Syria, with oil and other products sold to
finance the rebels coming the other way.[11] This apparently liberal approach to border security has had
a particular impact on the growth of the number of foreign extremist fighters in Northern Syria. Contrast
the state of affairs in the northern border regions of Syria with the picture in the south where tighter border
control is maintained by the Jordanians and the prevalence of extremist rebel groups is far more limited.[12]
One (perhaps less expected albeit limited) provider of financing is Israel, which funds certain groups out of
practical expediency, paying for information and intelligence on extremist groups operating near its border.
[13] In addition to the intentional supply of finance and weapons, countries supporting the opposition also
provide a good flow of regional and Western foreign fighters, displaying a mixed ability and willingness
to control this flow. In turn, as is well known, Iran and Russia provide the Assad regime with significant
support, all of which is critical to the regimes survival but some of which, particularly aircraft spare parts,
and perhaps most importantly fighting experience and tactical support, ensures that the regime will be able
to resist all but the most co-ordinated of rebel attacks.[14]

Finance and Proxy Jihad


In considering the role played by finance in the Syrian conflict, in particular the contribution of private
donations to rebel groups, it is important to illuminate one of the key motivations for private financial
donations, namely financial Jihad.[15] The Quran provides motivation, emphasising the importance of
giving generously to the cause of Jihad, linking voluntary, charitable contributions to a war effort.[16] The
most common method of contribution is Tajheez al-Ghazi, simply defined as fitting or arming a soldier. This
allows those who cannot, or will not, join the Jihad physically for whatever reason, to achieve the honour and
heavenly reward of waging Jihad by proxy. Donations and sponsorship are encouraged, for Whoever arms a
Ghazi then he would be considered a Ghazi, and whoever looked after the family of an absent Ghazi, he will
too be considered a Ghazi (Bukhari 2630). Today, more popular than shields, armour, and horses is money,
which is paid to individuals aspiring to make their way to jihadi theatres.

An example of this process in action, linked to the Syrian conflict, is the Ramadan Campaign conducted in
Kuwait in 2013. It involved 19 leading public, religious, and political figures and aimed to prepare 12,000
jihadists for the sake of Allah.[17] The campaign posters promised that a donation equivalent to US$
2,500 would prepare one fighter for battle. One evening event in the campaign raised US$ 350,000. Further
examples include: the campaign reported by the New York Times and run by a Syria-based Saudi sheikh close
to al-Qaeda, called Wage Jihad With Your Money in which donors were told that they would earn silver
status by giving US$ 175 for fifty sniper bullets, or gold status by giving twice as much for eight mortar

ISSN 2334-3745 55 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

rounds;[18] and as reported by the Washington Post pitches for the US$ 2,400 needed for the travel, arming,
and training of foreign fighters.[19] The importance of financial Jihad encourages rebel groups to emphasise
their Islamic credentials, thus shaping these groups strategies to maximize their appeal to those for whom
the ideology of the recipient is so important. In this regard, Kuwait has played a key aggregation and
channeling role as those who coordinate the raising and transferring of private donations seek a favourable
environment in which to operate.

Private Donors, Kuwait, and the Syrian Conflict


In light of the significant role private donors have played in enabling the conflict, it is worthwhile considering
this source of funding more closely. In the first instance, it is important to acknowledge that the generosity
of these regional donors is primarily driven by their desire to support the humanitarian work underway in
Syria. Yet a substantial portion has clearly been used to establish and support armed groups. The creation
of these armed groups was arguably motivated initially by the noble desire to shorten the war and thus end
suffering, but the actual result has been to super-empower radical groups,[20] exacerbate sectarianism,
and undermine much of the state-sponsored efforts to influence the conflicts outcome. As one analyst has
put it, this funding is helping create a self-sustaining dynamic that is totally independent of all the strategic
and diplomatic games that are happening and being led by states.[21] In the context of the flow of private
donations to Syria, it is important to take a moment to consider why Kuwait is such a popular origin
and conduit for private donor funding. One critical reason is the condition of the countrys illicit finance
regulatory regime.

At the heart of the global effort to counter illicit finance is the Financial Action Task Force (FATF), founded
in 1989 by the G-7 to inform and guide the global effort to combat money laundering by the criminal
narcotics industry. Following 9/11 when President George W. Bush signed Executive Order 13224 launching
a strike on the financial foundation of the global terror network to starve terrorists of funding,[22] FATF
was the natural vehicle to use. It quickly produced 9 Special Recommendations to supplement the existing
forty,[23] and over the following years organised regular evaluations to determine the extent to which
countries complied (or not) with these 49 Recommendations.

In 2010, Kuwait underwent its most recent FATF mutual evaluation. It revealed many shortcomings,
particularly in relation to countering terrorist finance, including a complete lack of the criminalisation
of terrorist financing, no established national Financial Intelligence Unit (FIU), and no implementation
of the relevant UN terrorist-financing conventions and Security Council resolutions.[24] Of FATFs 49
Recommendations, Kuwait was partially or not compliant with 37, a 75% failure rate. In contrast, Saudi
Arabia and Bahrain were partially or not compliant in 19 and 25 categories respectively.[25]

Kuwaits shortcomings at that time were underlined in leaked U.S. State Department cables from late 2009
which revealed frustration at a lack of inclination to take action against Kuwait-based financiers and
facilitators, noting that groups continue to exploit Kuwait both as a source of funds and as a key transit
point.[26]Although Kuwait finally introduced more internationally acceptable terror-finance legislation in
2013,[27] some believe Kuwait is less than serious about delivering on its commitment, exemplified by the
appointment in January 2014 of the Salafist and former MP Nayef al-Ajmi as Justice Minister and Minister of
Islamic Affairs and Endowments. Al-Ajmi openly confirms on Twitter that the struggle in Syria is a legitimate
Jihad and appears to be associated with fundraising for extremist rebels and others in Kuwait such as fellow
clan member Shafi al-Ajmi, who espouse support for the ideology of these extremist groups.[28] FATF also
remains to be convinced of Kuwaits genuine progress, noting at its plenary meeting in February, and again

ISSN 2334-3745 56 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

in June, that certain strategic Anti-Money-Laundering /Countering Financing [of]Terrorism (AML/CFT)


deficiencies remain in Kuwaits standards and procedures, placing it in uncomfortable company alongside
Afghanistan, Sudan, and Zimbabwe.[28] These remaining deficiencies are considerable, and were almost
certainly at the core of comments in March 2014 by David Cohen, Under Secretary for Terrorism and
Financial Intelligence at the U.S. Department of Treasury, when he said Our ally Kuwait has become the
epicenter of fundraising for terrorist groups in Syria.[30]

This statement is supported by the comprehensive December 2013 Brookings report Playing with Fire
by Middle East journalist Elizabeth Dickinson.[31] The report chronicles the broad range of fundraising
activities undertaken by a number of high profile Kuwaiti clerics and politicians in an environment where
charities are either autonomous or only lightly regulated. As highlighted by the report, although fundraising
is now more covert, during the first two years of the conflict campaigning for funds was undertaken publicly
via social media. Bank account details were often freely and openly displayed online, and fundraising events
were held by tribes and public figures using typical NGO target tactics to encourage donations for specific
goals such as weapons and fighter costs. Thus, although Kuwaitunlike regional neighboursdoes not
publicly back arming rebel groups, it has appeared reluctant to interfere with those individuals who choose to
do this despite the recent introduction of its new counterterror finance law.

The Role of the War Economy: A Sustaining Factor?


Whilst sovereign and privately-sourced funding has allowed Syrias conflict to flourish and persist, the
maturity of the conflict means that the establishment of a viable war economy risks providing a sustaining
source of finance that the international community is far less able to control or influence. The expansion of
territory controlled by IS across Syria and Iraq is indicative of the power that groups can derive from the war
economy as they control key financial nodes such as arterial roads, business districts, and oil fields.

Syrias economy has been set back generations by the conflict. The UN describes how the wholesale de-
industrialisation of the economy has precipitated a destructive restructuring of the economy as the countrys
core industries of mining, manufacturing, construction, internal trade, transport and communications, and
finance and real estate services have been destroyed.[32] It is estimated that 40% of the countrys GDP has
been eliminated. For example the U.S. Energy Information Administration estimates that Syria now produces
a mere 25,000 barrels of oil per day, down from 400,000 before the conflict began.[33] Every economic
measure tells a story of destruction and loss: the currency has devalued by 75% and national foreign exchange
reserves have been reduced from US$ 20 billion to US$ 5 billion as the Assad regime seeks to continue to
finance as much of the state as it can whilst income to its coffers dries up.[34]

Yet perversely, the longevity of the conflict is helping the development of the war economy, creating sources
of revenue that may replace state and private funding that is discouraged or interrupted. Some activities,
particularly oil extraction and agriculture remain operational to a limited extent. These activities are divided
across territory controlled by the various fighting factions and thus the spoils and revenues benefit different
groups. This division of assets creates some unexpected liaisons of convenience. For example in Northern
Syria, both Jabhat al-Nusra and IS have captured and control oil fields but not refineries, meaning that to
profit from the oil they either transport it out of the country or sell it to the regime which still controls and
operates refineries and needs this fuel to continue to support what little of the economy is still functioning.
[35]

Furthermore, new businesses are being established to meet the need to import goods previously produced
domestically the lack of foreign exchange combines with this import need to create a profitable foreign

ISSN 2334-3745 57 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

exchange black market. International sanctions placed on the banking sector also encourage valuable
business opportunities for barter, smuggling, and other trade outside formal corridors.[36] Local taxation
schemes have been established in areas controlled by rebel forces, and the government has diverted to the war
effort funds that are saved from no longer needing to provide services such as schools and salaries to many
government employees, particularly in areas no longer under government control. The government can also
save money on food imports, as the exodus of refugees to neighbouring countries means that the regime has
three million fewer citizens to feed and in many areas can leave the provision of food and basic services to aid
agencies.[37]

And for the Assad regime, the war economy brings a further benefit as it creates division amongst the
fighting factions as groups struggle with each other for control of lucrative business rather than uniting
to fight the regime. For example it is reported that criticism accompanied thecreation of the Syria
Revolutionaries Front (SRF) which was decried as nothing more than a collection of thieves with some rebel
leaders apparently dedicating as much of their energies to kidnappings, robbing food convoys, and smuggling
as to the fight against the regime.[38]

Ultimately, national economic collapse has created for some, a profitable, informal, rent-seeking opportunity
much of which is based on criminal enterprise and an economy of violence, but which has brought stability
to many areas albeit at the hands of crony businesses. To underline the extent to which the war economy
is the new normal, the currency, although significantly devalued, has experienced prolonged periods of
stability in 2014.[39]

Can Disrupting Financing Restrict the Conflict?


Whilst some hope that the economic restrictions and sanctions applied by various members of the
international communitysuch as the European Union, US, and Arab League might force the government
to negotiate, in reality it would seem that the economic support of allies such as Iran and Russia (for example
a US$ 3.6 billion credit line from Iran for the import of oil and medicine) will sustain the regime.[40]

So what can be done? On top of the existing sanctions regimes in place, specific steps have been taken by
various countries with the aim of restricting the flow of funds into the Syrian conflict. Kuwaiti authorities
introduced a new law on combating money laundering and the financing of terrorism in 2013: terrorist
financing is now criminalised and terrorist assets can now be frozen. Furthermore a fully independent
Financial Intelligence Unit has been established. Measures have also been put in place to control the activity
of Hawala and cash courier networks by requiring the declaration of currency and negotiable financial
instruments upon leaving Kuwait.[41] Saudi Arabia has issued a royal decree promising harsh prison
sentences in order to counteract clerics that urge the giving of support in the form of funds and fighters to
extremists in Syria[42] while the UAE has recently introduced tough penalties, including death, for those
found undertaking, supporting, or financing terrorist acts.[43] Yet these measures are directed against
terrorism, not against jihad and as long as the borderline between these two concepts has not been drawn
clearly, they are likely to remain of doubtful value.

Beyond the Middle East, authorities are seeking to restrict and control financial flows to the conflict.
Charities in countries such as the U.K. are under greater scrutiny[44] and the U.S. Department of Treasury
regularly designates and sanctions entities and individuals it believes to be funding designated terrorist
organisations or facilitating the circumvention of sanctions applied against the Syrian regime.[45] These flows
can be considerable as demonstrated by the U.S. Department of Treasury designation of Abd al-Rahman bin
Umayr al-Nuaymiin December 2013, accused of funnelling US$ 600,000 to al-Qaeda in Syria.[46] More

ISSN 2334-3745 58 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

generally, international authorities can also use off-the-record means to restrict financial flows by indicating
to banks that certain of their clients are being investigated for facilitating the conflict as a result, clients
subject to such suspicions may quickly find that banking services are withdrawn, and in some cases, accounts
closed. And finally, humanitarian assistance can be collected through state-sponsored or state-recognised
channels such as the UKs Disasters Emergency Committee, negating the need for private gatherings and
distributions.

But will these steps have an effect? Whilst financial arm-twisting has been used on the rebels previously to
secure attendance at the Geneva 2 talks in January 2014,[47] the ability of the international community to
influence the direction of the conflict via financial means will need a much greater level of co-ordination.
Even then, it is likely that the glacial pace with which the financing issue has been addressed has
significantly reduced the possible effectiveness of future action as an increasing proportion of these groups
financing comes from sources such as the war economy, beyond the reach of the international community.
Furthermore, supporters of the opposition are seemingly unable to agree on an escalation strategy, and are in
conflict with each other,[48] while Russia and Iran are apparently willing to continue their level of financial
and material support. Unless diplomatic efforts can reduce this input, restricting rebel finances will merely
tilt the battle in favour of the Assad regime.

Whilst the importance of financing as an enabling and sustaining factor remains, the apparent failure of the
international community to grasp this importance in a timely fashion means that its ability to influence the
course of the conflict via restricting and disrupting financing has become severely reduced.

About the Author: Tom Keatinge is a former investment banker at J.P. Morgan and now works as a Finance
& Security analyst and Associate Fellow at the Royal United Services Institute (RUSI). Toms research focuses
on the nexus between finance and security, in particular the funding of terrorist/extremist groups, and assessing
the extent to which disrupting financing and using financial intelligence can enhance international security. This
Research Note is based on his presentation at TRIs Syrian Engagement Conference, 2 May 2014.

Notes
[1] Warrick, Joby (2013), Private Donations Give Edge to Islamists in Syria, Officials Say, (Washington Post) http://www.washingtonpost.com/world/national-

security/private-donations-give-edge-to-islamists-in-syria-officials-say/2013/09/21/a6c783d2-2207-11e3-a358-1144dee636dd_story.html

[2] Lister, Charles (2014), Dynamic Stalemate: Surveying Syrias Military Landscape, p3 (Brookings Doha Center) http://www.brookings.edu/~/media/research/

files/papers/2014/05/19%20syria%20military%20landscape%20lister/syria%20military%20landscape%20english.pdf

[3] Manuwald, Gesin (ed) (2007), Marcus Tullius Cicero, Orationes Philippicae III-IX p202-203, (Berlin: Walter de Gruyter & Co)

[4] Adams, James (1986), The Financing of Terror, p. 53, (Sevenoaks: New English Library)

[5] Napoleoni, Loretta (2004), Terror Inc: Tracing the Money Behind Global Terrorism (London: Penguin)

[6] Wittig, Timothy (2011), Understanding Terrorist Finance, p. 65, (Basingstoke: Palgrave Macmillan)

[7] Morris, Loveday (2013), Battling on two fronts, moderate Syrian rebels struggle for funding, lose fighters

http://www.washingtonpost.com/world/middle_east/battling-on-two-fronts-moderate-syrian-rebels-struggle-for-funding-lose-fighters/2013/10/17/fa9232e6-359e-

11e3-89db-8002ba99b894_story.html

[8] Remnick, David (2014), Going the Distance: On and Off the Road with Barack Obama, (The New Yorker) http://www.newyorker.com/

reporting/2014/01/27/140127fa_fact_remnick?currentPage=all

[9] It should be noted that an increasing number of examples of private funding from outside the Middle East are emerging, however the amounts of money

ISSN 2334-3745 59 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

concerned are small in comparison. See for example: The Daily Telegraph (19 May 2014), University Student Caught with 20,000 Euros in Knickers Denies Terrorism,

http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/10840596/University-student-caught-with-20000-euros-in-knickers-denies-terrorism.html

[10] Bulos, Nabih (2014), Qatar: Syria rebels tiny ally in the background, (Los Angeles Times) http://articles.latimes.com/2014/jan/12/world/la-fg-syria-

funding-20140112; Khalaf, Roula & Abigail Fielding Smith (2013) Qatar Bankrolls Syrian Revolt with Cash and Arms, (Financial Times) http://www.ft.com/cms/

s/0/86e3f28e-be3a-11e2-bb35-00144feab7de.html?siteedition=uk#axzz2xwEdDRD1; and Kerr, Simeon (2014), Saudi Arabia cracks down on youths joining Syria

jihadis, (Financial Times) http://www.ft.com/cms/s/0/c98efe4e-8d88-11e3-bbe7-00144feab7de.html?siteedition=uk#axzz37oNPAfzF

[11] Zaman, Amberin (2013), Turkey backing off support for jihadists on Syria border, (Al-Monitor) http://www.al-monitor.com/pulse/originals/2013/11/turkey-

backs-off-support-syria-rebels-border.html# and Tastekin, Fehim (2014), Turkeys Syria border an open door for smugglers, (Al-Monitor) http://www.al-monitor.com/

pulse/originals/2014/04/turkey-syria-borders-smuggling-guns-conflict-kurds-pkk-isis.html#

[12] Ignatius, David (2014), On Syria, reality-check time for Washington, (Washington Post) http://www.washingtonpost.com/opinions/david-ignatius-on-syria-

reality-check-time-for-washington/2014/05/01/c72b3efa-d16d-11e3-9e25-188ebe1fa93b_story.html

[13] Sands, Phil & Suha Maayeh (2014), Israel buying information on extremists from rebel groups, (The National)http://www.thenational.ae/world/middle-east/

israel-buying-information-on-extremists-from-rebel-groups#page2#ixzz2xpjCzCox

[14] Hokayem, Emile (2014), Syria after Geneva II: Escalation and Fragmentation, (IISS Presentation) http://www.iiss.org/en/events/events/archive/2014-0f13/

march-a2fd/syria-after-geneva-aefd

[15] The concept of financial jihad was addressed in a previous Perspectives on Terrorism article. Dean, Aimen, Edwina Thompson & Tom Keatinge (2013),

Draining the Ocean to Catch one Type of Fish: Evaluating the Effectiveness of the Global Counter-Terrorism Financing Regime (Vol 7, No 4)

[16] See, for example, and wage Jihad with your wealth and your lives in the cause of God, Quran 9:41; The ones who have believed, emigrated and striven in the

cause of Allah with their wealth and their lives are greater in rank in the sight of God. And it is those who are the recipients of his reward, Quran 9:20

[17] Dickinson, Elizabeth (2013), Playing With Fire: Why Private Gulf Financing for Syrias Extremist Rebels Risks Igniting Sectarian Conflict at Home, Analysis Paper

No 16, p13 (Brookings)

[18] Hubbard, Ben (2013), Private Donors Funds Add Wild Card to War in Syria, (New York Times) http://www.nytimes.com/2013/11/13/world/middleeast/private-

donors-funds-add-wild-card-to-war-in-syria.html?_r=2&

[19] Warrick, Joby (2013), Private donations give edge to Islamists in Syria, officials say, (Washington Post) http://www.washingtonpost.com/world/national-security/

private-donations-give-edge-to-islamists-in-syria-officials-say/2013/09/21/a6c783d2-2207-11e3-a358-1144dee636dd_story.html

[20] Warrick, Joby (2013), Private money pours into Syrian conflict as rich donors pick sides, (Washington Post) http://www.washingtonpost.com/world/national-

security/private-money-pours-into-syrian-conflict-as-rich-donors-pick-sides/2013/06/15/67841656-cf8a-11e2-8845-d970ccb04497_story.html

[21] Hubbard, Ben (2013), Private Donors Funds Add Wild Card to War in Syria, (New York Times) http://www.nytimes.com/2013/11/13/world/middleeast/private-

donors-funds-add-wild-card-to-war-in-syria.html?_r=2&

[22] US Treasury Department (2002), Contributions by the Department of the Treasury to the Financial War on Terrorism: Fact Sheet, p2 http://www.treasury.gov/

press-center/press-releases/Documents/2002910184556291211.pdf

[23] FATF (2001), FATF IX Special Recommendations (Note: initial eight but increased to nine in 2004) http://www.fatf-gafi.org/media/fatf/documents/reports/

FATF%20Standards%20-%20IX%20Special%20Recommendations%20and%20IN%20rc.pdf

[24] FATF/MENA FATF (2011), Anti-Money Laundering and Combating the Financing of Terrorism: State of Kuwait, p3 http://www.fatf-gafi.org/media/fatf/

documents/reports/mer/MER%20Kuwait%20ES.pdf

[25] See respective FATF Mutual Evaluation Reports at http://www.fatf-gafi.org/documents/documents.jsp?lang=en

[26] US State Department (2009), via Wikileaks http://wikileaks.org/cable/2009/12/09STATE131801.html

[27] Al Tamimi & Co (2013), Kuwait: a New Stance on Financial Crime http://www.tamimi.com/en/magazine/law-update/section-5/september-3/kuwait-a-new-

stance-on-financial-crime.html

[28] The National Interest (2014), New Kuwaiti Justice Minister Has Deep Extremist Ties http://nationalinterest.org/commentary/new-kuwaiti-justice-minister-has-

deep-extremist-ties-9719?page=show. After much international criticism, al-Ajmi resigned in May 2014

ISSN 2334-3745 60 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

[29] FATF (2014), Improving Global AML/CFT Compliance: on-going process27 June 2014 http://www.fatf-gafi.org/countries/j-m/kuwait/documents/fatf-

compliance-june-2014.html

[30] Cohen, David (2014), Remarks of Under Secretary for Terrorism and Financial Intelligence David Cohen before the Center for a New American Security on

Confronting New Threats in Terrorist Financing

http://www.treasury.gov/press-center/press-releases/Pages/jl2308.aspx

[31] Dickinson, Elizabeth (2013), Playing With Fire: Why Private Gulf Financing for Syrias Extremist Rebels Risks Igniting Sectarian Conflict at Home, Analysis Paper

No 16, p13 (Brookings)

[32] United Nations (2013), Syria War on Development: Socioeconomic Monitoring Report of Syria (second quarterly report, April-June 2013) http://scpr-syria.org/

att/1382759391_c6yBX.pdf

[33] US Energy Information Administration (2014), Overview: update February 18, 2014 http://www.eia.gov/countries/cab.cfm?fips=sy

[34] Kapstein, Ethan & Amanda Mayoral (2014), The Economics of the Syrian Crisis, (US Institute of Peace)

http://inec.usip.org/blog/2014/feb/26/economics-syrian-crisis

[35] Hokayem, Emile (2014), Syria after Geneva II: Escalation and Fragmentation, (IISS Presentation) http://www.iiss.org/en/events/events/archive/2014-0f13/

march-a2fd/syria-after-geneva-aefd

[36] Financial Times (2013), Profiteers become another obstacle to peace in Syria http://www.ft.com/cms/s/0/f4d8e1ba-5853-11e3-9da6-00144feabdc0.

html?siteedition=uk#axzz2xoGH82qM

[37] The Economist (2013), Bullets and Bank Accounts http://www.economist.com/news/middle-east-and-africa/21583290-regime-fighting-financial-battle-bullets-

and-bank-accounts

[38] Abboud, Samer (2014), Syrias War Economy (Carnegie Endowment) http://carnegieendowment.org/syriaincrisis/?fa=54131

[39] Al-Sayegh, Hadeel (2014), Syria defends pound with US$20m injection after market went a bit crazy, (The National) http://www.thenational.ae/business/

industry-insights/finance/syria-defends-pound-with-us-20m-injection-after-market-went-a-bit-crazy

[40] The Economist (2013), Bullets and Bank Accounts http://www.economist.com/news/middle-east-and-africa/21583290-regime-fighting-financial-battle-bullets-

and-bank-accounts

[41] Al Tamimi & Co (2013), Kuwait: a New Stance on Financial Crime http://www.tamimi.com/en/magazine/law-update/section-5/september-3/kuwait-a-new-

stance-on-financial-crime.html

[42] Financial Times (2014), Saudi Arabia cracks down on youths joining Syria jihadis http://www.ft.com/cms/s/0/c98efe4e-8d88-11e3-bbe7-00144feab7de.

html?siteedition=uk#axzz2xWxTckKk

[43] Salama, Samir (2014), Terrorists in UAE to be penalised with death penalty or life imprisonment, (Gulf News) http://gulfnews.com/news/gulf/uae/government/
terrorists-in-uae-to-be-penalised-with-death-penalty-or-life-imprisonment-1.1356367

[44] UK Charity Commission, Syria and aid convoysregulatory alert, http://www.charitycommission.gov.uk/our-regulatory-work/how-we-regulate-charities/alerts-

and-warnings/syria-and-aid-convoys/

[45] See for example, Treasury Designates Al-Qaida Leaders In Syria http://www.treasury.gov/press-center/press-releases/Pages/jl2396.aspx

[46] US Treasury Department (2013), Treasury Designates Al-Qaida Supporters in Qatar and Yemen http://www.treasury.gov/press-center/press-releases/Pages/

jl2249.aspx

[47] Sands, Phil (2014), Syria peace talks pay dividends for rebels on the battlefield, (The National) http://www.thenational.ae/world/middle-east/syria-peace-talks-

pay-dividends-for-rebels-on-the-battlefield#ixzz2y05gjL54

[48] Solomon, Erika (2014), Betrayal and disarray behind Syrian rebel rout in Yabroud, (Financial Times) http://www.ft.com/cms/s/0/d65eb03c-b0f7-11e3-bbd4-

00144feab7de.html?siteedition=uk#axzz37oNPAfzF

ISSN 2334-3745 61 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Special Research Notes Section: Bart Schuurman, Guest Editor

Using Primary Sources for Terrorism Research: Introducing Four Case Studies
by Bart Schuurman

Several years ago, Magnus Ranstorp lamented the paucity of publications that critically assess the state of the
art in the study of terrorism.[1] A glance at the books and articles published since 9/11 does indeed reveal
that such assessments are relatively few in number.[2] These however, are often damning in their critique.
Emblematic in this regard is the oft-encountered quote attributed to Michael Howard, a doyen of the study of
terrorism, who once commented that the field had been responsible for more incompetent and unnecessary
books than any other outside of sociology. It attracts phoneys and amateurs as a candle attracts moths.[3]
More recently, Marc Sageman, one of the leading contemporary terrorism scholars, has argued that terrorism
research was in a state of stagnation; despite all the funding that had become available since 9/11 and despite
the massive increase in books and articles published on the subject, our understanding of the phenomenon
has failed to make significant strides forward.[4] While other internationally-renowned scholars, like John
Horgan, Jessica Stern, Alex Schmid and Max Taylor have countered with several examples of evidence-based
research that have indeed advanced our understanding of terrorism, Sagemans polemic at the very least
raises some important issues.[5]

One of the problems that Sageman addresses is academics lack of access to reliable and detailed data on
terrorism. Government agencies frequently possess such information but security concerns prevent them
from sharing it, leaving researchers to rely too often on much less detailed and reliable open sources such
as newspaper articles.[6] The problem of overreliance on secondary sources of information has been one of
the longest-standing issues to affect the study of terrorism.[7] Despite signs of a trend away from reliance on
secondary literature and a greater use of primary sources[8], and notwithstanding the encouraging finding
that the secondary data problems does not appear to affect all aspects of terrorism research equally[9], much
remains to be done. One of Sagemans suggestions is to produce thick descriptions; primary sources-based
accounts of terrorist groups and incidents that can function as a foundation on which to build and from
which to test hypotheses empirically.[10] It is towards this goal that the four Research Notes in this issue
hope to make a modest contribution.

The first three articles present rich and detailed descriptions of homegrown jihadist groups in Western
countries. These are the Dutch Hofstadgroup, the German Sauerlandgruppe and the large Australian
network that became the focus of Operation Pendennisthat countrys biggest terrorism investigation to
date. The fourth article looks at a very contemporary phenomenon, describing the backgrounds of Dutch
jihadists who travelled to Syria as foreign fighters. All four pieces rely strongly but not exclusively
on a detailed examination of primary source material. The Hofstadgroup case study utilises police files
and interviews with both government stakeholders involved in the investigation and some former group
participants. The piece on the Sauerlandgruppe builds on the German court verdict while the Research Note
on Operation Pendennis utilises the minutes of courtroom proceedings, court verdicts and interviews with
public prosecutors. Exploring the background of Dutch foreign fighters was done on the basis of interviews
with several individuals who had observed with their own eyes the changes that these aspiring jihadists went
through before journeying to Syria.

The process of gaining access to the primary sources used in these four articles was instructive in several
ways. To begin with, the process was distinctly time-consuming. Another problem was that the terms of use

ISSN 2334-3745 62 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

stipulated by the datas owners (usually a government) were sometimes restrictive to an unfortunate (and in
our view, unnecessary) extent. This is most apparent in the article on the Sauerlandgruppe, where the author
had access to a considerable amount of data gathered by the German police but was ultimately not allowed to
use them directly in the Research Note presented here. Despite such setbacks, it was encouraging to realise
how much was possible with persistent attempts to gain access. Although it was not always a straightforward
process nor was it always clear how and where to apply for permission to use certain files, and although
finding interviewees and convincing them to cooperate was especially challenging, patience, perseverance
and a portion of good luck more often than not led to a positive outcome.

On behalf of all the authors, I would like to take this opportunity to thank those individuals involved in
facilitating our access to the sources mentioned above. A special word of thanks goes out to the interviewees
for their time and willingness to help. We hope that readers will find these pieces useful as resources for their
own studies on contemporary homegrown jihadism and the foreign fighter phenomenon. Finally, we would
like to thank the editors of Perspectives on Terrorism for providing us with the opportunity to put together
this special Research Notes section.

About the Author: Bart Schuurman (MA, Utrecht University) is a researcher and PhD student at the Centre
for Terrorism and Counterterrorism (CTC) at Leiden Universitys Campus The Hague in The Netherlands. His
PhD research focuses on understanding the rise and development of homegrown jihadist groups and takes the
Hofstadgroup as its case study.

Notes
[1] Magnus Ranstorp, Mapping Terrorism Studies after 9/11: An Academic Field of Old Problems and New Prospects, in Critical Terrorism Studies: A New

Research Agenda, ed. Richard Jackson, Marie Breen Smyth, and Jeroen Gunning (New York / Abingdon: Routledge, 2009), 13-14.

[2] Andrew Silke, The Devil You Know: Continuing Problems with Research on Terrorism, Terrorism and Political Violence 13, no. 4 (2001): 1-14; Research

on Terrorism: Trends, Achievements and Failures (London / New York: Frank Cass, 2004); Magnus Ranstorp, ed. Mapping Terrorism Research: State of Art, Gaps

and Future Direction (London / New York: Routledge, 2007); Richard Jackson, Marie Breen Smyth, and Jeroen Gunning (Eds.), Critical Terrorism Studies: A New

Research Agenda (New York / Abingdon: Routledge, 2009); Alex P. Schmid (Ed.) The Routledge Handbook of Terrorism Research (London / New York: Routledge,

2011); Lisa Stampnitzky, Disciplining an Unruly Field: Terrorism Experts and Theories of Scientific/Intellectual Production, Qualitative Sociology 34, no. 1 (2011):

1-19.

[3] Quoted in: Bruce Hoffman, The Myth of Grass-Roots Terrorism: Why Osama Bin Laden Still Matters, Foreign Affairs 87, no. 3 (2008): 136.

[4] Marc Sageman, The Stagnation in Terrorism Research, Terrorism and Political Violence,Vol. 26, No. 3, September-October 2014: 1-16.

[5] John Horgan and Jesica Stern, Terrorism Research Has Not Stagnated, The Chronicle of Higher Education, May 8, 2013; Jessica Stern, Response to Marc

Sagemans The Stagnation in Terrorism Research, Terrorism and Political Violence, Vol . 26, No. 4 (2014): 607-613; Alex P. Schmid, Comments on Marc Sagemans

Polemic The Stagnation in Terrorism Research, Terrorism and Political Violence, Vol . 26, No. 4 (2014): 587-595; Max Taylor, If I Were You, I wouldnt Start from

Here: Response to Marc Sagemans The Stagnation in Terrorism Research, Terrorism and Political Violence, Vol . 26, No. 4 (2014): 581-586.

[6] Ibid., 6.

[7] Cynthia Lum, Leslie W. Kennedy, and Alison J. Sherley, The Effectiveness of Counter-Terrorism Strategies, Campbell Systematic Reviews, no. 2 (2006): 8; Silke,

The Devil You Know, 5-7; Alex P. Schmid and Albert J. Jongman, Political Terrorism: A New Guide to Actors, Authors, Concepts, Data Bases, Theories, and Literature

(New Brunswick: Transaction Books, 1988), 179.

[8] Andrew Silke, Contemporary Terrorism Studies: Issues in Research, in Richard Jackson, Marie Breen Smyth, and Jeroen Gunning (Eds.) Critical Terrorism

Studies: A New Research Agenda, (New York / Abingdon: Routledge, 2009), 40-41, 48; Alex P. Schmid, Introduction, in The Routledge Handbook of Terrorism

Research, ed. Alex P. Schmid (Ed.)., op. cit., 2011), 11.

ISSN 2334-3745 63 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

[9] Peter Neumann and Scott Kleinmann, How Rigorous Is Radicalization Research?, Democracy and Security 9, no. 4 (2013): 372.

[10] Sageman, The Stagnation in Terrorism Research, 8.

ISSN 2334-3745 64 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

A History of the Hofstadgroup


by Bart Schuurman, Quirine Eijkman and Edwin Bakker

Abstract
This Research Note provides a chronological overview of the most important events that occurred during the
2002-2005 existence of the Dutch Hofstadgroup. This group is frequently cited as a leading example of the
homegrown jihadist threat that arose in Europe from 2004 onwards. Despite this status in the literature, a
detailed and above all primary sources-based account of the main developments of this group has so far been
missing. With this contribution, the authors hope to provide fellow researchers with a useful resource for their
own work on the Hofstadgroup and homegrown jihadism more broadly.

Keywords: homegrown, jihadism, the Netherlands, Hofstadgroup

Introduction
There is an ongoing need within the field of terrorism studies for rich, detailed and primary-sources based
descriptions of terrorist groups and incidents.[1] The value of such accounts is twofold; they provide precise
and reliable insights into a particular group, individual or event and those same qualities make them valuable
for use as building blocks in other scholars research. This Research Note provides a thorough chronological
description of a well-known example of European homegrown jihadist terrorism by focusing on the Dutch
Hofstadgroups activities during its 2002-2005 lifespan. Ultimately, the authors hope that this description can
become a useful resource for other scholars interested in the Hofstadgroup in particular and homegrown
jihadism in general. Four specific arguments are advanced for this contributions relevance.

First of all, numerous publications take the Hofstadgroup or elements thereof as a case study but most do
not provide more than a cursory glance at the groups activities and development.[2] Secondly, while some
of the studies that do present detailed accounts of the Hofstadgroup are enlightening and informative, the
accuracy and reliability of even the best accounts is marred by a reliance on newspaper articles as sources or
by a lack of references altogether.[3] Although newspaper articles are a necessary staple in terrorism research
as they are frequently the only readily available sources, media reports may be biased, often offer only brief
descriptions of events and can be inaccurate.[4] Thirdly, some accounts of the Hofstadgroup betray a less
than objective approach to the subject matter.[5] Finally, many existing publications are in Dutch, leaving
room in the English literature on homegrown jihadism for a detailed description of this group.[6]

In a more general sense, even though almost ten years have passed since Dutch filmmaker Theo van Gogh
was murdered by a Hofstadgroup participant, the group is still a worthy subject of investigation because
many aspects of this phenomenon remain contested. The most notable of these concerns the very nature
of this group. Although frequently presented as a key or even quintessential example of homegrown
jihadist terrorism, closer examination reveals it is more accurately described as an amorphous collective of
radicalised young Muslims centered around a hardcore of extremists.[7] Although these extremist elements
underwent an organisational and ideological development towards a jihadist terrorist network, this process
was never fully completed. Essentially, the arrests of 2004 and 2005 decimated the Hofstadgroup, forestalling
its maturation into a full-fledged jihadist terrorist network.[8]

The Dutch police files on the various investigations into the Hofstadgroup are the most important primary
sources used in this Research Note.* Additional information is taken from five semi-structured interviews;

ISSN 2334-3745 65 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

two with former Hofstadgroup participants and three with Dutch government officials who were involved
in the Hofstadgroup investigation in some capacity. Although extensive and detailed, these sources also have
several drawbacks that must be acknowledged. First of all, both contain their own biases. The police files
predominantly document findings that can be used to prosecute the suspects and may therefore underexpose
exculpatory evidence. The interviewees might spin stories to present themselves in a more favorable light or
they may simply have forgotten relevant facts due to the passage of time.[9] A second drawback is that these
sources are not publically available, making it difficult for readers to comparatively assess the present study
against others. Thirdly, the conditions for the use of both types of sources stipulate complete anonymity,
which means that none of the participants in the Hofstadgroup can be named herealthough some of their
names are in the public domain. While this decreases the readability of the narrative, this downside is
outweighed by the benefits in terms of reliability and detail that these sources accord.

A Clarification of Premises
Several assumptions underlying this analysis need to be clarified. First of all, the name Hofstadgroup is
inherently misleading as it was coined by the Dutch secret service, the AIVD, and was not used by the groups
participants.[10] This relates to the second point alluded to earlier, namely that whether or not a recognisable
group ever existed, let alone a terrorist organisation or network, is a matter of ongoing debate.[11] The use
of the Hofstadgroup designation is upheld here because it has become the accepted name for this group
in the literature. Thirdly, based on the authors estimates, the Hofstadgroup encompassed approximately 38
individuals. Included in this number are all of the persons arrested in conjunction with the various criminal
investigations linked to Hofstadgroup and those who participated in group meetings at least twice. Naturally
this definition of participation is contestable, but it provides a suitable starting point for the following
discussion. Finally, because space constraints prohibit an exhaustive reconstruction of events, the focus is on
the key participants and the most important developments. Topics such as the court cases or descriptions of
day-to-day life in the group are not discussed here.

2002: The Hofstadgroups Initial Formation


The earliest references to the Hofstadgroup stem from 2002. Approximately halfway through the year, the
group managed to attract the AIVDs attention, although the intelligence service only labeled them as the
Hofstadgroup from October 2003 onwards.[12] Little is known about the groups activities at this point in
time, but it appears that group meetings were taking place by the end of 2002. A middle-aged Syrian asylum
seeker took a prominent role during these so-called living room meetings as a religious instructor.[13] He
does not appear to have spoken of the use of violence or participation in jihad directly, yet his teachings
conferred a dogmatic and fundamentalist interpretation of Islam. This formed a fertile base for some
participants subsequent radicalisation into a decidedly extremist, pro-violence, interpretation of Islam based
primarily on Salafi-Jihadist principles.[14]

These meetings were held in various locations, with an internet caf in Schiedam and the residence of Van
Goghs to-be murderer in Amsterdam being used regularly.[15] A first hint that elements of the group were
developing extremist views manifested itself towards the end of the year. In November, one person who
would feature prominently in the groups extremist core supposedly spoke out in favor of a mass-casualty
bombing attack.[16] It is interesting to note that initial group formation appears to have been based primarily
on pre-existing ties of friendship and not, as some authors have claimed, on active recruitment.[17] Many
participants had grown up in the same neighborhoods, attended the same schools or knew each other

ISSN 2334-3745 66 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

through their local mosques.[18] In the words of one former participant, the Hofstadgroup was a circle of
acquaintances[19]

2003: Would-be Foreign Fighters and International Connections


At the start of the year, a prominent Hofstadgroup participant and a friend of his attempted to join Islamist
rebels in Chechnya. They were arrested by local authorities just after they crossed the border with Ukraine
and were sent back home after questioning. Upon return to the Netherlands they were interrogated further
by both the Dutch police and the AIVD.[20 That summer, two other Hofstadgroup participants separately
undertook travel to Pakistan where they allegedly met each other for the first time at a Quran school.
However, chat messages written after their return and intelligence information paint a different picture; these
imply that both underwent or at least sought paramilitary training in Pakistan or Afghanistan. That this trip
was more than an opportunity to study Islam abroad is underlined by a farewell letter one of the two young
men left for his family, in which he expressed his desire to remain in the land of jihad.[21] The groups 2003
activities underline the importance of contextual factors; principally the 2001 intervention in Afghanistan,
the 2003 war in Iraq and, more locally, the example set by two young Dutch Salafists who in 2002 traveled to,
and were killed in, Kashmir.[22]

September October 2003


These two men returned from Pakistan separately in September. Later that month, AIVD intelligence
revealed that one of the Pakistan-goers may have returned on the instigation of an unnamed emir who
tasked him with collecting balloons. According to a fellow Hofstadgroup participant, this particular traveler
had returned to play a match before Ramadan that year (which began on the 27th of October). Around the
same time it was also discovered that this individual, together with the person who tried to reach Chechnya
and a third participant in the Hofstadgroup, were in contact with a Moroccan man living in Spain who was
sought by the Moroccan authorities for his involvement in the 2003 Casablanca bombings.[23]

The Hofstadgroup participant who had been tasked by the unknown emir, traveled to Barcelona in the first
week of October to meet the Moroccan man. While there, he also met an acquaintance of the Moroccan
suspect who Spanish authorities believed had ties to the Iraqi terrorist organization Ansar al-Islam. Another
Hofstadgroup participant communicated with the Moroccan man via telephone from the Netherlands and
apparently received instructions to procure a notebook and credit. Other topics of conversation were shoes
class 1 and class 2 and things that come from Greece or Italy. The Moroccan suspect also mentioned that he
would send a man from Belgium to meet the participant he had been phoning with. Whether this meeting
occurred is unclear, although two of the participants who were in contact with the Moroccan individual
traveled to Belgium on the 15th of October 2003 for unknown purposes.[24]

On the 14th of October, the Spanish authorities arrested the Moroccan suspect. A day later, the AIVD
informed the Dutch public prosecutors office about the travels to Pakistan/Afghanistan and the Spanish
connection. The police arrested five Hofstadgroup participants on the 17th of October. These included the
three individuals who undertook travel abroad, two of whom were in contact with the Moroccan man,
another person who was also in contact with the Moroccan individual and the middle-aged Syrian religious
instructor. House searches turned up books, tapes and digital materials espousing an extremist interpretation
of Islam, study notes on martyrdom, an unknown (at that point) persons will expressing a desire to die
as a martyr and, in the case of one of those arrested, materials suggestive of an interest in constructing an
explosive device. All of the suspects were released at the end of October for lack of evidence.[25]

ISSN 2334-3745 67 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

The police were thus unable to substantiate the possibility that the suspects were planning a terrorist attack
or assisting foreign groups or individuals in doing so. Given that two of those arrested had in September
and October been trying to encourage other young Dutch Muslims to travel to Pakistan, a likely explanation
for the emirs task is that it was to inspire others to make the trip. The communication with the Moroccan
suspect in Spain is harder to explain, although possibly the Hofstadgroup participants were providing
logistical assistance with acquiring a passport (notebook) and money (credit). What the other terms
referred to, and what type of match was to be played before Ramadan remains unclear.

December 2003
On the very last day of 2003, one of the Pakistan travelers undertook a second journey to that country, this
time accompanied by a fellow Hofstadgroup participant. Scarcely more than a week later, on the 9th of
January 2004, both of them returned to the Netherlands. The sources provide three different explanations
for this rapid return. In the first one, recounted by one of the travelers, the two men visited an Islamic school
some forty to fifty kilometers from Islamabad for an intake interview. Once there, they were warned that
they could be arrested which prompted the duo to leave the country. The second explanation stems from
the two-time Pakistan traveler, who allegedly told witnesses that they were detained by American soldiers
in Afghanistan and sent back to the Netherlands. The third explanation comes from a witness, who said that
one of the travelers had told him they were detained by unknown persons and given the choice of leaving
immediately or being handed over to the local Pakistani authorities.[26]

2003 and the Radicalisation of Van Goghs To-Be Murderer


Judging by the tone and contents of his writings and translations, 2003 also saw the man who would murder
Van Gogh in November 2004 rapidly embrace more radical and fundamentalist views.[27] This process was
accompanied by a withdrawal from mainstream Dutch society; he quit his job, stopped volunteer work for
his local community in June and distanced himself from non-religious old friends. Around the same time he
adopted the clothing, facial hair style and convictions of a fundamentalist Muslim, leading him to become
known as the Taliban among youths in his Amsterdam neighborhood. Of particular interest is the finding
that he travelled to Denmark in October. The sources do not reveal what the Hofstadgroup participant did
there, but it is possible that he visited a Syrian preacher who lived there. The preacher was a friend of the
Hofstadgroups Syrian religious instructor and occasionally travelled to the Netherlands to visit him.[28]

2004: Individualistic Plots and the Murder of Theo van Gogh


With the exception of the short second trip to Pakistan, the Hofstadgroup appears to have undertaken very
few, if any, communal activities during 2004. Whereas burgeoning collective efforts involving at least parts
of the group could be identified in 2003, such as the contacts with the Moroccan suspect and the attempts
to encourage other Dutch Muslims to travel to Pakistan, 2004 was characterized by distinctly individualist
initiatives. Although the reasons for this change were manifold, including a lack of organizational structure
and clear leadership, the importance of the October 2003 arrests in this regard cannot be overlooked.[29]
A former participant described the arrests as resulting in an acutely heightened sense of paranoia and a
preoccupation with personal safety. This was debilitating to the point that the interviewee designated the
Hofstadgroup as being effectively crippled by early 2004.[30] In 2004, the Dutch contribution to the war in
Iraq and the terrorist attack in Madrid proved to be important sources of inspiration for the groups most
extremist participants to begin considering the possibilities of waging violent jihad in the Netherlands.[31]

ISSN 2334-3745 68 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

January March 2004


While the realization that they were under surveillance dampened group-based activities, a small number
of individuals were not deterred. Peters analysis of the writings of Van Goghs to-be killer, shows that this
participant moved from radical (i.e. not necessarily violent) convictions to distinctly extremist (i.e. clearly
pro-violence) ones around March 2004.[32] His ongoing radicalisation into violent extremism would lead
him, around the summer of that year, to embrace the view that blasphemers ought to be killed.[33] This
provided him with both the motive and the justification for murdering the writer and filmmaker Van Gogh,
who was very outspoken in his criticism of Islam and Muslims and often presented his arguments in a coarse
fashion.

April 2004
Several other notable developments took place before that time, however. On the 8th of April a supermarket
in Rotterdam was robbed by two men armed with automatic weapons. Although the suspicion could not
be substantiated by concrete evidence, the robbers likely received help getting into the store from one of
its employeesthe Hofstadgroup participant who tried to reach Chechnya a year earlier. Minutes after
the robbers got away with approximately 700 Euros, one of them was arrested and later confirmed as an
acquaintance of the stores Hofstadgroup employee.[34] Several Hofstadgroup participants have since claimed
that the second robber was also involved in the group and only managed to evade the police because he was
in fact an AIVD informant.[35]

May June 2004


On the 18th of May, the police received information which raised the possibility that the supermarket
employee was involved in preparations for a terrorist attack. Several weeks later, on the 7th of June, that same
individual was captured on security cameras walking around the AIVDs headquarters in Leidschendam,
apparently measuring distances by taking equally spaced steps. These events contributed to his second arrest,
on the 30th of that month. Among the items encountered in the ensuing house search were photographs,
maps and directions, downloaded from the internet, that described the AIVD headquarters, but also the
nuclear reactor in Borssele, the House of Representatives, the Ministry of Defense, Amsterdam Schiphol
airport and the barracks of the Dutch commandos in Roosendaal. Other finds included a bullet proof vest,
firearm components that could be fitted to the weapons used in the supermarket robbery (two magazines and
a silencer), electrical circuits, night-vision goggles, household chemicals, fertiliser, documents espousing an
extremist interpretation of Islam, jihad handbooks and a hand-written will in the suspects name.[36]

While indicative of an interest in improvised explosive devices (IED), it should be noted that the electrical
circuits and chemicals were everyday, over-the-counter items that had not (yet) been combined into an
explosive device or its precursor components. It should also be emphasised that the particular type of
fertiliser found turned out to be unsuitable for making an explosive substance.[37] Hence, the suspect does
not appear to have had the capacity to construct an actual bomb at that point in time.

Also in June, two other Hofstadgroup participants were found to have inquired about fertiliser at a garden
store. Whether this had anything to do with interest in constructing an IED remains unclear. However, it
is noteworthy that the individual arrested on the 30th was found in possession of a list of addresses of that
particular chain of stores.[38] Secondly, on the 6th of June, two different Hofstadgroup participants, in the
company of two acquaintances who do not appear to have been directly involved in the group, traveled to

ISSN 2334-3745 69 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Portugal.

Following a tip-off likely provided by the AIVD, in which the possibility was raised that the goal of this trip
was to commit a terrorist attack during the European soccer championships or to kill former Portuguese
Prime Minister Barosso, the four travelers were arrested by the Portuguese police on the 11th and their
whereabouts searched. No evidence was uncovered to substantiate any of the terrorism related hypotheses
or a later claim by a witness that the trips goal was to acquire weapons. In light of the lack of incriminating
evidence, it may simply have been the case that the Hofstadgroup participant who came up with the idea for
the trip in the first place, an illegal immigrant from Morocco, was telling the truth when he stated that he
had wanted to benefit from a Portuguese amnesty for asylum seekers. Similarly, there is little to contradict his
companions claim that they went along to enjoy a holiday.[39]

Despite the lack of incriminating evidence, all four travelers were handed over to the Portuguese immigration
police on the 14th of June for visa irregularities and sent back to the Netherlands several days later. Upon his
arrival at Schiphol airport, the trips initiator was questioned by the Dutch police. One particularly interesting
aspect of this conversation is that he warned the police of a friend of his who, he claimed, spoke a lot of jihad,
adhered to the ideology of takfir (declaring other Muslims apostates [40]) and who wanted to join the jihad
in Chechnya. This friend would later commit the murder of Van Gogh.[41] What motivated the person being
questioned to divulge such information is unknown.

Two other developments round off this overview of the eventful month of June 2004. On the 14th, the mother
of two Hofstadgroup participants filed a statement with the police declaring that she and her daughters
felt threatened by her two sons extremist and violent behaviour to the point that they moved out of their
own home.[42] Investigations conducted later in 2004 also revealed the 14th of June to be the first day on
which an AIVD interpreter leaked confidential information to two Hofstadgroup participants; one of them
received a weekly report on the group in June and the other a wiretap in August. The leak was discovered in
September 2004 when a Dutch newspaper faxed a part of the weekly report to the AIVD. The interpreter was
a prior acquaintance of one of the groups participants, for whom the AIVD employee had bought a travel
ticket from Al Hoceima (Morocco) to Amsterdam in May 2003.[43] Why he leaked this information and
what, if any, effect the files had on the Hofstadgroup remains unknown.

August 2004
On the 29th of August, the Somali-born Dutch politician Ayaan Hirsi Ali appeared for an in-depth interview
on the TV-program Zomergasten (summer guests). As part of the show, a short Islam-critical film she
had recently made with Van Gogh called Submission, part 1 was broadcast.[44] The film, which contains
fragments in which Quranic verses are projected on semi-naked women, was met with either disgust or
indifference by the Dutch Muslim community.[45] But among the Hofstadgroup the film evoked some
particularly strong reactions, which is perhaps unsurprising as having renounced her Muslim faith, Hirsi Ali
was already a particularly hated public figure in Islamist circles.[46]

On the 30th, a message appeared on MSN Group Muwahhidin De Ware Moslims (Muwahhidin The True
Muslims[47]). This website was administered and frequented by Hofstadgroup participants, e.g. for the
purposes of propagating the increasingly extremist texts written by Van Goghs to-be killer. It was also used
to get in touch with other young Dutch Muslims who held similar ideas or could be persuaded to do so. The
message, titled The unbelieving diabolical mortada [apostate], Ayaan Hirsi Ali, was posted by an individual
on the groups edges. In it, the author claimed that the Muwahhidin Brigade had uncovered Hirsi Alis
residence, proceeded to publish that presumed address in full and also posted a picture of Van Gogh.[48]

ISSN 2334-3745 70 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

A second message followed on the 4th of September and was openly threatening. Writing of Hirsi Ali, the
author claimed that wherever she hides, death shall find her![49]. The messages author was arrested on the
14th of September.

September 2004
On the 15th of September, the Dutch police received an anonymous e-mail warning them that two
individuals were potentially preparing a terrorist attack. The anonymous source had supposedly been asked
by two terrorists to commit attacks in the Netherlands, with the House of Representatives and Amsterdams
red light district as possible targets. Unfortunately, the available sources divulge no further information
on this potential terrorist plot.[50] Interestingly, however, one of the two supposed terrorists was an active
participant in the Hofstadgroup. In September, he responded affirmatively to a question posted on the
website TawheedWalJihad inquiring whether it was a Muslims duty to kill those who insulted the prophet
Muhammad. To substantiate his argument, the Hofstadgroup participant relied on a translation of Ahmad
Ibn Taymiyyas argument to this extent. The translation of the influential 14th century Salafist scholars
writings on this subject had been the work of Van Goghs future killer. The individual acting as an online
helpdesk on extremist matters was arrested on the 8th of November because he had issued death threats to
Dutch politician Geert Wilders using the aforementioned website.[51]

November 2004
On 2 November 2004, the Dutch filmmaker and writer Theo van Gogh was murdered while cycling to work
in his hometown of Amsterdam. The killer cycled up alongside Van Gogh, shot him several times with a
pistol and then tried to decapitate the dead or dying victim with a kukri knife. Without having accomplished
this task, he decided to pin a prepared note to the dead mans chest with another knife in which he threatened
Hirsi Ali with death. Calmly reloading his HS model 95 firearm, the killer then walked towards a nearby park
where a shoot-out with police officers ensued. After running out of ammunition and being shot in the leg,
Van Goghs murderer was arrested. Three other people were also hit by the gunmans bullets; one bystander
in the leg, another in the heel of her foot and one police officer in his bulletproof vest. Upon being taken into
custody, the killer was told that he was lucky to be alive; he responded that he had hoped to die.[52]

Nine witnesses later reported having seen the killer at different locations along the route Van Gogh usually
travelled to work between early October and the day of the murder. Two witnesses, independently of each
other, claim to have seen the killer on the 1st of November standing with his bike along Van Goghs usual
route, observing passing cyclists. This implies that Van Goghs attacker had carefully chosen where to strike
and perhaps even that the second of November was not his first attempt to kill the filmmaker.[53]

There has been considerable speculation about the rest of the groups involvement in or knowledge of this
premeditated murder. Yet the available evidence indicates that the murder was planned, prepared and
executed solely by the attacker himself.[54] Based on his explanation in court, he appears to have been
primarily driven by a sense that it was an individual believers duty to behead those who insulted Allah and
his prophet, as Van Gogh had allegedly done with his movie and writings. He took full responsibility for his
actions and claimed that he would have done exactly the same had the blasphemer been his brother or father.
[55]

Van Goghs murder was the only actual terrorist attack carried out by a Hofstadgroup participant. By leaving
a message threatening Hirsi Ali on his victims body, and through six other open letters that were to be

ISSN 2334-3745 71 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

published by his compatriots, the killer made clear that his goal was not just to kill the filmmaker, but to use
his death to send messages to several audiences; threatening ones to unbelievers and apostate Muslims and
inspirational calls to action to what he dubbed the Muslim youth.[56] As such, it falls clearly within Schmids
definition of terrorism and cannot be labeled as simply a murder.[57]

The authorities responded to the murder by arresting most of the known members of the Hofstadgroup on
the day of the murder. Two, however, managed to evade apprehension. One was the middle-aged Syrian man
who had provided religious instruction to the group. Aided by several acquaintances, he left the day that
Van Gogh was killed, traveling via Belgium and Greece and entering Syria illegally via Turkey. Despite the
striking coincidence, the police investigation was unable to ascertain with any degree of certainty whether or
not the Syrian man was aware of the murderers plans. The second participant who got away was a member
of what could be dubbed the groups extremist core and who featured earlier as the initiator of the trip to
Portugal. Where precisely he went after evading arrest has remained unclear. He may have travelled back to
his family in Morocco in November 2004 and spent a considerable amount of time until his arrest in June
2005, probably living in Brussels or possibly in Luxemburg, from where he would occasionally travel to the
Netherlands.[58]

The most dramatic episode in the arrests of suspected Hofstadgroup members occurred during the early
hours of the 10th of November 2004. As a police arrest squad tried to force the door on the apartment
of two suspects in The Hague around 02:50 in the morning, they found that it had been barricaded from
within and could only be partially opened. The suspects had prepared for the polices arrival and discussed
beforehand how to respond to it. Mere moments after the squads attempt to force entry to the apartment,
one of its occupants threw a hand grenade through the crack between door and doorframe, which passed the
officers standing on the landing and bounced down the outdoor stairwell to the street where it exploded on
the pavement. Moments after realizing a grenade had been thrown at them, one of the police officers fired
twice at their attacker, both shots hitting the wall just beside his head. The grenades explosion injured five
policemen, one of them seriously.[59]

The arrest squad was forced to pull back and a stalemate ensued that was only ended by the deployment of
a military special forces unit at the end of the day.[60] Until that time, the two suspects made various phone
calls to friends and family, announcing their imminent martyrdom, hastily wrote wills and made several
prank calls to the emergency services asking for the police to come and rescue them from the masked scary
men surrounding their home.[60] They also threatened to blow up the entire street with twenty kilograms
of explosives, provoked the officers to shoot them and were seen waving a sword and firearm that would
later turn out to be a fake. Towards the end of the afternoon, the special forces operators went into action.
After 18 tear gas canisters were fired into the apartment through its windows, the two suspects clambered
over their own barricades onto a balcony. Special forces soldiers in an opposite building then ordered them
to raise their hands. When one of the suspects appeared unwilling to comply, a warning shot was fired. The
suspects were then told to undress and descend into the garden via a ladder. As the unresponsive suspect was
observed reaching into his jacket pocket, he was shot in the shoulder. Subsequently, both suspects complied
with the soldiers orders, climbed down to the garden and were taken into custody. No explosives were found
in the apartment, but the suspects pockets did contain three additional hand grenades.[61]

2005: From Hofstadgroup to Piranha


The November 2004 arrests ended what could be called the first generation Hofstadgroup. Yet no more than
a couple of months later, from approximately April 2005 onwards, a small group re-emerged that, with regard

ISSN 2334-3745 72 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

to its participants, ideological convictions and practical intentions, was a direct successor to the 2002-2004
Hofstadgroup. This second generation has become known under the name of the police investigation into its
activities, i.e. the Piranha group. Despite the separate investigations and court cases, the Piranha group was
essentially a continuation of the Hofstadgroup and is treated here as such.

The groups 2005 resurgence was made possible by three factors. First of all, the individual arrested in
June 2004 after snooping around the AIVD headquarters was acquitted and released in April 2005. Thus,
one of the more extremist individuals in the Hofstadgroup was able to continue his activities. Secondly,
another member of the Hofstadgroups extremist core had evaded arrest in November 2004 and remained
at large until his apprehension in June 2005. During this interval, he contributed to the radicalisation of
several young women on the Hofstadgroup / Piranha groups edges and strengthened the new groups
operational capabilities by procuring three firearms. These two men appear to have formed the new groups
main protagonists. Of the remaining nine individuals ultimately earmarked as suspected members of
the Piranha group, all but two had been on the original Hofstadgroups edges. The arrest of most of the
original participants seems to have brought these peripheral individuals forward into positions of increased
prominence.[62]

From its April 2005 starting point, the Piranha group displayed some interesting differences from its
predecessor. Most importantly, there appeared to be a burgeoning sense of hierarchy, tenuous indications
of a return to more group-based efforts and, importantly, clearer signs that these efforts were in the service
of terrorism related goals.[63] Under the overall guidance of the individual released in April 2005, some of
the participants in the Piranha group appear to have become involved in the development of three potential
terrorist plots. The first appears to have been focused on several Dutch politicians, with particular interest
shown in Hirsi Ali. The second one had as its target an El Al airliner, while the third envisioned a double
strike; first at the AIVD headquarters and then at several Dutch politicians.

April 2005
One of the first things the individual released in April 2005 did was to approach an old acquaintance,
someone who had been in contact with Hofstadgroup participants from approximately the end of 2003.
During the trial against the Piranha suspects, this person claimed to have been coerced and threatened by
the groups two ringleaders, for instance into renting a house for the group in Brussels and occasionally
supplying participants with money.[64] In contrast, the other suspects in the Piranha case have claimed that
this individual was in fact very radical, not at all involuntarily associated with them and purely motivated to
give incriminating testimony in court to avoid being sentenced.[65] Although the currently available data
do not allow these conflicting claims to be convincingly resolved, it should be noted that this was one of the
witnesses whose testimony a Dutch court qualified as unreliable.[66]

Police intelligence from early April 2005 indicated that the individual recently released from detention had
gathered a new group around him, that he wanted to die as a martyr and that he was driven to rectify the 1-
0 in the unbelievers favour.[67 This latter point indicates that he was at least partially motivated by a personal
desire for revenge for his arrest and incarceration. This motive also appears in various writings by and about
this individual, which highlights his experience of poor treatment by the Dutch justice system and police and,
especially, his adversarial relationship with the AIVD.[68]

ISSN 2334-3745 73 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

May 2005
The Piranha ringleader who had been a fugitive since November 2004, allegedly told two other participants
that he had a CD-ROM with instructions on how to make a suicide vest and that the required components
could be bought in Germany. In the same period, this individual turned up in possession of three firearms;
a Czech Skorpion version 61 submachine gun (also referred to as a baby Uzi), an Agram 2000 submachine
gun with a separate silencer and a .38 caliber Smith & Wesson revolver. In May, he also instructed a
participant to visit the groups other leader, the man released from custody in April, to pick something up.
This turned out to be a piece of paper printed in an internet caf which listed the names, addresses and
telephone numbers of several Dutch politicians.[69]

June 2005
June was a particularly interesting month with several noteworthy developments. On or around the 15th,
the fugitive and a companion took two other participants to a large park in Amsterdam to fire one of the
submachine guns at a tree.[70] Several days later, on the 20th, the aforementioned companion phoned a
family member who worked at a pharmacy in The Hague. The companion asked for the addresses of the
politicians who frequented it and was particularly interested in Hirsi Alis, but was not given any such
information.[71] The next day, police officers conducting surveillance in The Hague recognised the fugitive
they had sought since November 2004. At the time, he had been staying with an acquaintance, someone who
appears to have been pressured into providing shelter and transportation.[72]

This was also the case a day later, on the 22nd of June, when the acquaintance was instructed to drive the
fugitive and a companion to Amsterdam. Both of them seemed tense and the fugitive made their driver
take evasive maneuvers twice, in an apparent attempt to shake off any possible tails. Upon arrival in
Amsterdam, he took over the wheel and drove towards the train station Amsterdam Lelylaan, where he and
his companion got out. Upon reaching the platform, both were apprehended by a police special intervention
unit. At the time, the fugitive was carrying the loaded Agram 2000 in his backpack. In the drivers home,
the police found a handwritten and coded note listing the addresses of four Dutch politicians that appears
to have belonged to the two people who had just been arrested. Their interest in the whereabouts of Dutch
politicians and Hirsi Ali in particular, something corroborated by the statements of two inmates who met
them in prison, raises the possibility that they planned to assassinate one or more of these individuals.[73]
Their arrest marks the end of this first potential terrorist plot.

Two days after the arrests, on the 24th of June, the groups remaining ringleader phoned one of his
imprisoned Hofstadgroup friends. He mentioned being unable to sleep since the arrests, that the earth is
very warm at this moment and that there was a story which had not yet made the newspapers and which
would astound his friend.[74] The next day he phoned again and cryptically talked of a soup that was still
boiling but would make it onto television soon.[75] On the 29th of April, just after this persons release from
prison, the police had begun an investigation into the network surrounding him called Paling (eel). After
these mysterious phone calls and the other events of June, the police suspected that the individual in question
was plotting terrorism related crimes. Indicative of the investigations changed focus it was renamed Piranha
on the 28th of June.[76]

July 2005
Approximately a month later, just after midnight on the 26th of July, police officers observed the Piranha

ISSN 2334-3745 74 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

groups main protagonist enter a park in The Hague in the company of an unknown male. Not much later a
bang was heard. Its source has never been discovered. Another interesting July development occurred two
days later, when the AIVD informed the police that they had indications that the groups remaining leader
was involved in terrorist activities.[77]

August 2005
Starting in early August, the second potential terrorist plot attributable to the Piranha group began to
manifest itself. Police intelligence reports indicated that a group of young men of Moroccan descent in
Amsterdam West, including two Piranha participants, were working on a plan to shoot down an El Al
plane at Schiphol airport, possibly using some type of Rocket Propelled Grenade (RPG). The reports raised
the possibility that one individual had been tasked with conducting a reconnaissance of a particular area
of Schiphol airport and that the plot was being funded by a levy on criminal proceeds of acquaintances of
the Piranha ringleader in Amsterdam and The Hague. The intelligence information, however, could not be
determined to be reliable.[78] Subsequent police investigations were unable to substantiate the intelligence
information and thus raise the possibility that no such plot existed to begin with.[79]

In contrast to the first generation Hofstadgroup, living room meetings did not feature as prominently in the
2005 Piranha continuation. While various participants did visit each other and although some individuals
provided religious instruction, relatively large-scale group meetings such as those that were held at the
house of Van Goghs killer were not noted in the available sources. A likely explanation is that the Piranha
group had developed a much more acute sense of operational security and was wary of indoor gatherings.
Several meetings were held outdoors in public places, such as on the 24th of August in The Hague, when four
Piranha participants were observed together, on the 7th of September in Amsterdam, when two individuals
met and exchanged a package, and on the 11th of October when five suspected members of the Piranha
group met in The Hague.[80]

September 2005
In September 2005, the Piranha groups principal protagonist met a Belgian national of Moroccan descent
at a train station in The Hague. According to police information, the Belgian man declined the protagonists
request to participate in a kamikaze operation on the grounds that he was already planning something in
Morocco.[81] A different take on the episode is given by Groen and Kranenberg, who describe the Belgian
man as a cousin of a participant of the original Hofstadgroup and as supposedly offering three female
suicide bombers to his Piranha contact, who these authors claim declined the offer because he wanted men
only. The Belgian man was arrested in Morocco in November 2005 on charges not related to the Piranha
case. The available data offer no further information on the incident and the Belgian man later retracted his
statement about the meeting, making it impossible to determine precisely what was discussed.[82]

October 2005
The third and final potential terrorist plot came to the fore in October. AIVD information dated earlier that
month indicated that the Piranha groups participants were, to differing degrees, involved in preparations for
a terrorist attack in the Netherlands. This potential attack was to occur before the 31st of October, the date
set for the main protagonists appeals hearing. The plot was thought to consist of two parts; one group of
attackers would target politicians while the second would force entry to the AIVD headquarters and blow it

ISSN 2334-3745 75 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

up. None of the perpetrators expected to survive the attacks. However, the AIVD information also indicated
that the Piranha ringleader was looking for additional weaponry; ten AK-47 assault rifles, two silenced pistols
and ten suicide vests containing eight kilograms of explosives each. The individual in question apparently
expected a call from someone to discuss delivery of these goods. Phone intercepts revealed that a meeting
between a possible supplier and the ringleader was arranged for the 12th of October. However, despite
agreeing to the time and place over the phone, the Piranha participant did not show up.[83]

The next day, the police received additional information from the AIVD that precipitated the suspects arrest.
Most important was a videotaped will in which the groups main protagonist, seated next to the Skorpion
submachine gun, threatened the Dutch state and its citizens for, among other things, its involvement in the
Iraq war. Until the Dutch left Muslims alone and chose the path of peace the language of the sword would
reign.[84] He also appeared to bid his family farewell by stating that he commits this deed out of fear for
the punishment of Allah.[85] In addition, he called upon other Muslims to rise up in defense of oppressed
co-relgionists worldwide and spoke out in support of several arrested Hofstadgroup participants.[86] Just
how the AIVD got its hands on this video has remained unclear. One possible explanation, provided by the
Piranha participant in question, is that an AIVD informant assisted with the recording and then supplied it
to the AIVD after staging a burglary as cover for the tapes disappearance.[87]

Acting on the above information, the police arrested the remaining Piranha suspects on the 14th of October
without incident. Among the items found during the ensuing house searches were three gas masks, several
balaclavas, radical and extremist materials and, notably, a document made by one of the suspects called
lessons in safety which reflected the Piranha groups greater awareness of and concern for the authorities
interest in them.[88] The remaining two firearms the Skorpion and the revolver were, however, not
recovered at this time. They were found on the 28th of August 2006 in the cellar of one of the Piranha
suspects home by plumbers called in to address flooding on the premises.[89] The October 2005 arrests
effectively put an end to the Hofstadgroup.

Conclusion
This Research Note presented a primary-sourced based overview of the most important developments in
the 2002-2005 existence of the Dutch Hofstadgroup, a group that is frequently cited as one of the leading
examples of the homegrown jihadist threat that arose in Europe from 2004 onwards. By virtue of the
sources used, this contribution is distinguished from existing chronological accounts of this group in terms
of the level of detail provided and the reliability of that information. It thereby offers a valuable resource
for other researchers interested in the Hofstadgroup or the broader phenomenon of homegrown jihadism.
Although the overview presented here is unique in terms of descriptive detail and use of primary sources,
many open questions for future research remain. Most importantly, while the present Note goes some way
towards explaining what happened, why or how these events occurred are questions that have so far not been
addressed in a systematic and empirically-grounded fashion. Hopefully, the near future will see greater use of
primary sources-based research to answer the why and how questions raised by the Hofstadgroup.

* The authors received written permission from the Dutch Ministry of Security and Justice to use these
sources on 8 March 2013. In accordance with the terms of use, they are utilized solely for a PhD thesis and
related articles on the rise and development of the Hofstadgroup.

About the Authors: Bart Schuurman (MA, Utrecht University) is a researcher and PhD student at the Centre

ISSN 2334-3745 76 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

for Terrorism and Counterterrorism (CTC) at Leiden Universitys Campus The Hague in The Netherlands. His
PhD research focuses on understanding the rise and development of homegrown jihadist groups and takes the
Hofstadgroup as its case study. Quirine Eijkman (PhD, Utrecht University) is the head of the Political Affairs &
Press Office of Amnesty Internationals Dutch section and a Senior-Researcher/Lecturer at the CTC. Her research
focuses on the (side) effects of security governance on human rights, transitional justice and the sociology of
law. Edwin Bakker (PhD, University of Groningen) is professor of (counter) terrorism studies, director of
the CTC and Fellow of the International Centre for Counter-Terrorism (ICCT) in The Hague. His research
interests include violent radicalization, jihadi terrorism and communication and impact management aspects of
counterterrorism.

Notes
[1] Marc Sageman, The Stagnation in Terrorism Research, Terrorism and Political Violence Vol. 26, No. 3, September-October 2014: 8.

[2] The Hofstadgroup has been studied from numerous perspectives. Several authors have looked at the role of women in and around the group: Janny Groen

and Annieke Kranenberg, Women Warriors for Allah: An Islamist Network in the Netherlands (Philadelphia: University of Pennsylvania Press, 2010); Beatrice De

Graaf, Gevaarlijke Vrouwen: Tien Militante Vrouwen in Het Vizier (Amsterdam: Boom, 2012), 249-40. Others have looked at how broader societal factors influence

the attitudes of young Muslims in the Netherlands and set some of them on a path towards radicalization: Frank J. Buijs, Froukje Demant, and Atef Hamdy,

Strijders Van Eigen Bodem (Amsterdam: Amsterdam University Press, 2006). Some scholars have looked specifically at the Salafist movement in the Netherlands

and how its development helped bring about the Hofstadgroup: Martijn De Koning and Roel Meijer, Going All the Way: Politicization and Radicalization of the

Hofstad Network in the Netherlands, in Identity and Participation in Culturally Diverse Societies, ed. Assaad E. Azzi, et al. (Chichester: Wiley-Blackwell, 2011),

220-38. Several studies focus primarily on the backgrounds and motives of individual participants of the Hofstadgroup: Ruud Peters, Dutch Extremist Islamism:

Van Goghs Murderer and His Ideas, in Jihadi Terrorism and the Radicalisation Challenge: European and American Experiences, ed. Rik Coolsaet (Farnham /

Burlington: Ashgate, 2011), 145-59; Martijn De Koning, Changing Worldviews and Friendship: An Exploration of the Life Stories of Two Female Salafists in the

Netherlands, in Global Salafism: Islams New Religious Movement, ed. Roel Meijer (London / New York: Hurst, 2009), 372-92; Marion Van San, Stijn Sieckelinck,

and Micha De Winter, Idealen Op Drift: Een Pedagogische Kijk Op Radicaliserende Jongeren (The Hague: Boom, 2010), 44-53; Ian Buruma, Murder in Amsterdam:

The Death of Theo Van Gogh and the Limits of Tolerance (London: Atlantic Books, 2007); Arjan Erkel, Samir (Amsterdam: Uitgeverij Balans, 2007); Clark McCauley

and Sophia Moskalenko, Friction: How Radicalization Happens to Them and Us (New York: Oxford University Press, 2011), 85-88. Another set of studies has

focused on multiculturalism and the problematic integration of Muslim immigrants in Dutch society as causal factors: Paul Cliteur, Religieus Terrorisme En De

Lankmoedige Elite, in Gaat De Elite Ons Redden? De Nieuwe Rol Van De Bovenlaag in Onze Samenleving, ed. Krijn Van Beek and Marcel Van Ham (Amsterdam:

Van Gennep, 2007), 207-35; Bart Jan Spruyt, Cant We Discuss This? Liberalism and the Challenge of Islam in the Netherlands, Orbis 51, no. 2 (2007): 313-30;

Robert S. Leiken, Europes Angry Muslims, Foreign Affairs 84, no. 4 (2005): 120-35; Rob De Wijk, The Multiple Crises in Dutch Parallel Societies, in Between

suicide bombings and the burning Banlieues: the multiple crises of Europes parallel societies, ed. Rob De Wijk, Samir Amghar, and Amel Boubekeur, ESF Working

Papers (Brussels: Center for European Policy Studies, 2006), 7-14; Geert Mak, Gedoemd Tot Kwetsbaarheid (Amsterdam / Antwerp: Atlas, 2005); Abigail R.

Esman, Radical State: How Jihad Is Winning over Democracy in the West (Santa Barbara: Praeger, 2010). The Hofstadgroup has featured prominently in analyses

of the role of the internet and the influence of a militant Salafist ideology on radicalisation processes and it has been the subject of social network analyses: Frazer

Egerton, The Internet and Militant Jihadism: Global to Local Re-Imaginings, in Cyber-Conflict and Global Politics, ed. Athina Karatzogianni (Abingdon / New

York: Routledge, 2008), 115-27; Frazer Egerton, Jihad in the West: The Rise of Militant Salafism (Cambridge: Cambridge University Press, 2011), 12, 18, 29-36, 48,

75-83, 97-125, 29, 45-51; Rene Van der Hulst, Terroristische Netwerken En Intelligence: Een Sociale Netwerkanalyse Van De Hofstadgroep, Tijdschrift voor

Veiligheid 8, no. 2 (2009). Finally, the Hofstadgroup is one of the anonymised cases in a study on jihadist terrorism in the Netherlands: C.J. De Poot et al., Jihadi

Terrorism in the Netherlands: A Description Based on Closed Criminal Investigations (The Hague: Boom Juridische Uitgevers / Wetenschappelijk Onderzoek- en

Documentatiecentrum, 2011).

[3] Petter Nesser, Jihad in Europe: Patterns in Islamist Terrorist Cell Formation and Behaviour, 1995-2010 (Oslo: University of Oslo, 2012), 332-58; Marc Sageman,

Hofstad Case & the Blob Theory, in Theoretical Frames on Pathways to Violent Radicalization, ed. Scott Atran, Marc Sageman, and Rogier Rijpkema (ARTIS

Research & Modelling, 2009), 13-29, 82-99; Lorenzo Vidino, The Hofstad Group: The New Face Terrorist Networks in Europe, Studies in Conflict & Terrorism

30, no. 7 (2007); Beatrice De Graaf, The Van Gogh Murder and Beyond, in The Evolving Global Terrorism Threat: Cases from 9/11 to Osama Bin Ladens Death,

ed. Bruce Hoffman and Fernando Reinares (New York: Columbia University Press, 2014), 144-87; Security & the Rule of Law Project Transnational Terrorism,

ISSN 2334-3745 77 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

The Hofstadgroep, in TTSRL Contextual Papers (The Hague: TTSRL, 2008); Albert Benschop, Chronicle of a Political Murder Foretold, Sociosite, http://www.

sociosite.org/jihad_nl_en.php.

[4] Roberto Franzosi, The Press as a Source of Socio-Historical Data: Issues in the Methodology of Data Collection from Newspapers, Historical Methods 20, no. 1

(1987): 6-9; Frederick Schulze, Breaking the Cycle: Empirical Research and Postgraduate Studies on Terrorism, in Research on Terrorism: Trends, Achievements and

Failures, ed. Andrew Silke (London / New York: Frank Cass, 2004), 163; Tom Quiggin, Words Matter: Peer Review as a Failing Safeguard, Perspectives on Terrorism

7, no. 2 (2013): 73-76.

[5] Vermaats account is informative and based on some interesting sources. Unfortunately it suffers from the authors lack of an objective approach to the subject

matter. Emerson Vermaat, De Hofstadgroep: Portret Van Een Radicaal-Islamitisch Netwerk (Soesterberg: Aspekt, 2005). Wessels less than objective approach asserts

itself in the first pages of his book, where he assumes the Hofstadgroups suspects guilt and criticizes the public prosecutors chosen strategy even though the

court cases were still ongoing at that point in time. M. Wessels, De Radicaal-Islamitische Ideologie Van De Hofstadgroep: De Inhoud En De Bronnen (The Hague:

Teldersstichting, 2006), 2-3.

[6] Several Dutch journalists have provided well-researched accounts of the murder of Van Gogh and the events surrounding the Hofstadgroup: Siem Eikelenboom,

Niet Bang Om Te Sterven: Dertig Jaar Terrorisme in Nederland (Amsterdam: Nieuw Amsterdam, 2007); Jutta Chorus and Ahmet Olgun, In Godsnaam: Het Jaar Van

Theo Van Gogh (Amsterdam: Contact, 2005); Sanne Groot Koerkamp and Marije Veerman, Het Slapende Leger: Een Zoektocht Naar Jonge Jihad-Sympathisanten in

Nederland (Amsterdam: Rothschild & Bach, 2006); Erkel, Samir.

[7] Vidino, The Hofstad Group, 579.

[8] Bart Schuurman, Quirine Eijkman, and Edwin Bakker, The Hofstadgroup Revisited: Questioning Its Status as a Quintessential Homegrown Jihadist Network,

Terrorism and Political Violence (Forthcoming): 1-23.

[9] John Horgan, Walking Away from Terrorism: Accounts of Disengagement from Radical and Extremist Movements (New York: Routledge, 2009), 15.

[10] Commissie van Toezicht betreffende de Inlichtingen- en Veiligheidsdiensten, Toezichtsrapport Inzake De Afwegingsprocessen Van De Aivd Met Betrekking

Tot Mohammed B., (Commissie van Toezicht betreffende de Inlichtingen- en Veiligheidsdiensten, 2008), 8.

[11] Schuurman, Eijkman, and Bakker, The Hofstadgroup Revisited, 1-20.

[12] J.P.H. Donner and J.W. Remkes, Kamerstukken 2, 2004-2005, 29854, Nr. 3, (The Hague: Sdu Publishers, 2004), 5, 18.

[13] General Intelligence and Security Service, Violent Jihad in the Netherlands: Current Trends in the Islamist Terrorist Threat, (The Hague: General Intelligence

and Security Service, 2006), 37.

[14] Police Files Hofstadgroup, VERD: 19480, 705-706, 747; 01/17: 4095; NCTV, Personal Interview 1, (The Hague 2012), 2; Public Prosecutor 1, Personal

Interview 1, (The Hague 2012), 8.

[15] Police Files Hofstadgroup, 01/18: 89-90.

[16] Ibid., AHA02/19: 100.

[17] Leiken, Europes Angry Muslims, 125; Emerson Vermaat, Samir a[.] -a Terrorist in the Making or a Real Terrorist?, Militant Islam Monitor.org, 23 November

2005, 2.

[18] Police Files Hofstadgroup, VERD: 19444, 59, 675, 717, 858-860, 877, 916, 980, 994, 20079, 112, 115, 174; GET: 18215, 312-313, 374-375, 414, 20348; 01/17:

4176; AHA03/20: 1227; Erkel, Samir, 78-79.

[19] Hofstad Former 3, Personal Interview 1, (Leiden 2013), 4.

[20] Police Files Hofstadgroup, 01/01: 33; GET: 18061-62; Mayke Calis, Iedereen Wil Martelaar Zijn; Het Avontuur Van De Amsterdamse Moslim Mo (16),

Rotterdams Dagblad, 29 March 2003.

[21] Police Files Hofstadgroup, 01/01: 140-41, 63; AHA04/21: 1657, 66; AHA05/22: 2176; AHD07/36: 8401-02; AHD08/37: 569-571, 595-597, 618-619, 635-637,

715-717, 767-769, 773-775, 880, 919-931; AHD09/38: 9049, 54-56.

[22] De Koning and Meijer, Going All The Way, 227-231; Samir A[.], Deurwaarders, (2004) 11.

[23] Police Files Hofstadgroup, 01/01: 23-24; Samir A[.], Deurwaarders Van Allah, (2004 / 2005) 33.

ISSN 2334-3745 78 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

[24] Ibid., 01/01: 23-25; AHA01/18: 80-81; RHV01/66: 18845-46.

[25] Ibid., 01/01: 24-27; RHV01/66: 18792; Donner and Remkes, Kamerstukken 2, 2004-2005, 29854, Nr. 3, 25-26.

[26] Police Files Hofstadgroup, 01/13: 141-43; GET: 18840, 452.

[27] Peters, Dutch Extremist Islamism, 145-59.

[28] Police Files Hofstadgroup, 01/01: 32, 37; GET: 8349, 18415; VERD: 9754; Commissie van Toezicht betreffende de Inlichtingen- en Veiligheidsdiensten,

Toezichtsrapport Inzake De Afwegingsprocessen Van De Aivd, 11; Jaco Alberts et al., De Wereld Van Mohammed B, NRC Handelsblad, 9 July 2005; Chorus and

Olgun, In Godsnaam, 61; Annieke Kranenberg, De Zachte Krachten Achter Mohammed B., De Volkskrant, 20 November 2004.

[29] Schuurman, Eijkman, and Bakker, The Hofstadgroup Revisited, 1-20.

[30] Hofstad Former 3, Personal Interview 1, 5.

[31] De Koning and Meijer, Going All The Way, 232; Hofstadgroup Former 1, Personal Interview 2, 22-23.

[32] Peters, Dutch Extremist Islamism, 152-55.

[33] Ibid., 155-56.

[34] Police Files Hofstadgroup, 01/01: 38-39.

[35] Erkel, Samir, 209; De Graaf, Gevaarlijke Vrouwen, 262; Janny Groen and Annieke Kranenberg, Saleh B. Wel Terroristisch Actief , De Volkskrant, 2 June 2007;

Jaco Alberts and Steven Derix, Het Mysterie Van De Onbekende Extremist, NRC Handelsblad, 29 October 2005.

[36] Police Files Hofstadgroup, 01/01: 38-45.

[37] Ibid., 01/01: 48-49.

[38] Ibid., 01/01: 40; 01/13: 175.

[39] Ibid., 01/13: 104; AHA03/20: 859; GET: 18375; VERD: 20347-48; RHV02/67: 19216-18, 91-92; Diogo Noivo, Jihadism in Portugal: Grasping a Nebulous

Reality, (Madrid: Real Instituto Elcano, 2010), 6; Vidino, The Hofstad Group, 583.

[40] For more information on takfir, see: Quintan Wiktorowicz, Anatomy of the Salafi Movement, ibid.29, no. 3 (2006): 207-39.

[41] Police Files Hofstadgroup, AHA03/20: 859-61; RHV02/67: 19292.

[42] Ibid., 01/01: 141; AHA03/20: 831.

[43] Ibid., 01/13: 104; AHA05/22: 837, 1811-13, 37; David J. Kilcullen, Subversion and Countersubversion in the Campaign against Terrorism in Europe, Studies in

Conflict & Terrorism 30, no. 8 (2007): 657; Jaco Alberts and Steven Derix, Aivd-Stuk Lekte Uit Naar Extremisten, NRC Handelsblad, 9 November 2004.

[44] The film can be viewed online. See, for instance: YouTube, Submission: Part 1, https://www.youtube.com/watch?v=G6bFR4_Ppk8. Data retrieved 15 April

2014.

[45] Hirsi Ali Zoekt Tegenstanders Voor Haar Wedstrijd, De Volkskrant, 30 August 2004.

[46] Police Files Hofstadgroup, 01/13: 74, 161-62; Erkel, Samir, 223.

[47] Muwahhidin refers to Muslims who uphold a strict belief in the concept of tawhid (the unity of god). See: John L. Esposito, Islam: The Straight Path (New York

/ Oxford: Oxford University Press, 2011), 146.

[48] Police Files Hofstadgroup, AHA04/21: 1324-39, 42; AHA05/22: 2339; 01/17: 4002-03, 25-26, 47; Benschop, A Political Murder Foretold.

[49] Police Files Hofstadgroup, AHA04/21: 1325.

[50] Ibid., 01/01: 179-80.

[51] Ibid., 01/01: 160, 67, 200-01, 03; Benschop, A Political Murder Foretold; Peters, Dutch Extremist Islamism, 156.

[52] J.P.H. Donner and J.W. Remkes, Kamerstukken 2, 2004-2005, 29854, Nr. 1, (The Hague: Sdu Publishers, 2004), 1-2; Frits Van Straelen, Requisitoir in De

Strafzaak Tegen Mohammed B., (Parketnr 129227-04: Arrondissementsparket Amsterdam, 2005), 10-27; Police Files Hofstadgroup, 01/13: 95. Available at: http://

vorige.nrc.nl/krant/article1867376.ece. Retrieved 23 April 2014.

ISSN 2334-3745 79 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

[53] Van Straelen, Requisitoir in De Strafzaak Tegen Mohammed B., 9-10.

[54] Ibid., 6-7; Public Prosecutor 2, Personal Interview 1, (Amsterdam 2012), 1-3; Police Files Hofstadgroup, 01/01: 93-96; NCTV, Personal Interview 1, 6;

Steven Derix, Hoe Kwam Toch Die Vingerafdruk Op B.S Brief?, NRC Handelsblad, 27 July 2005.

[55] Verklaring Mohammed B. In Tekst, NOS, http://static.nos.nl/nosjournaal/dossiers/terreurinnederland/verklaringbtekst.html. Retrieved 9 May 2014.

[56] Peters, Dutch Extremist Islamism, 156-57.

[57] Alex P. Schmid, The Definition of Terrorism, in The Routledge Handbook of Terrorism Research, ed. Alex P. Schmid (London / New York: Routledge, 2011), 86.

[58]Police Files Hofstadgroup, AHA02/19: 755; GET: 4069; Public Prosecutor 1, Personal Interview 1, 17, 42; Groen and Kranenberg, Women Warriors for Allah,

84-85.

[59] Police Files Hofstadgroup, 01/13: 38, 95-96, 105-06, 71; GET: 18011, 235-237; AGV01/62: 7967-04.

[60] For more information on this special forces unit, see: M.J. De Weger, Continuteit En Verandering: Het Nederlandse Stelsel Van Antiterreureenheden Sinds

Zijn Oprichting, in Terrorisme: Studies over Terrorisme En Terrorismebestrijding, ed. E.R. Muller, U. Rosenthal, and R. De Wijk (Deventer: Kluwer, 2008), 630.

[61] Police Files Hofstadgroup, AHA07/24: 3112.

[62] Ibid., 01/01: 131; 01/12: 9-10; 01/13: 71; AHA02/19: 610-14; AHA07/24: 3087-127; AGV01/62: 17969-8005; GET: 8011, 8235-8237. A partial account of these

events can be found here: The Hague Court of Appeal, LJN BC2576, (2008).

[63] Police Files Hofstadgroup, 01/17: 4085-86, 128, 179, 201; Police Files Piranha, REL00: 55, 62, 205; Public Prosecutor 1, Personal Interview 1, 42.

[64] Schuurman, Eijkman, and Bakker, The Hofstadgroup Revisited, 1-20.

[65] Police Files Piranha, REL00: 61-63, 82-83, 85-86, 104-05, 58-60, 211-14; Sageman, Hofstad Case, 85.

[66] Annieke Kranenberg and Janny Groen, Kroongetuigen Vallen in Eigen Kuil, De Volkskrant, 2 December

2006; Getuige Piranha-Zaak Zelf Radicaal, ibid., 28 October.

[67] Kranenberg and Groen, Kroongetuigen Vallen in Eigen Kuil.

[68] Police Files Piranha, REL00: 29; NOVA, Informatie Aivd En Politie Uit Strafdossier, http://www.novatv.nl/page/detail/nieuws/8239/

Informatie+AIVD+en+politie+uit+strafdossier.

[69] De Graaf, Gevaarlijke Vrouwen, 273; Erkel, Samir, 199-200, 06-08, 18-19, 27-28, 40-41.

[70] Police Files Piranha, REL00: 61-62; Bart Den Hartigh and Alexander Van Dam, Requisitoir Piranha Deel 1, (2006), 70.

[71] Police Files Piranha, REL00: 213.

[72] Ibid., REL00: 158-60.

[73] Police Files Hofstadgroup, AHA06/23: 2564-600, 618-620.

[74] Ibid., AHA06/23: 2587-89, 96, 610-612, 713, 755-756; 01/17: 4236-38, 41; Police Files Piranha, REL00:

99; 1056.

[75] Police Files Piranha, REL00: 144-45.

[76] Ibid., REL00: 144-45.

[77] Ibid., REL00: 28-29, 34.

[78] Ibid., REL00: 39-40; NOVA, Informatie AIVD En Politie Uit Strafdossier.

[79] Police Files Piranha, REL00: 40-42; NOVA, Informatie AIVD En Politie Uit Strafdossier.

[80] Den Hartigh and Van Dam, Requisitoir Piranha Deel 1, 5; NOVA, Informatie AIVD En Politie Uit Strafdossier.

[81] Police Files Piranha, REL00: 43-44; Den Hartigh and Van Dam, Requisitoir Piranha Deel 1, 7.

[82] Police Files Piranha, 151-52, 91-92.

ISSN 2334-3745 80 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

[83] Groen and Kranenberg, Women Warriors for Allah, 144-46.

[84] Police Files Piranha, REL00: 46-53; NOVA, Informatie AIVD En Politie Uit Strafdossier.

[85] NOVA, Videotestament Samir A.Vertaling Nova, NOVA, http://www.novatv.nl/page/detail/nieuws/8887/Videotestament+Samir+A.+-+vertaling+NOVA.

[86] Ibid.

[87] Ibid.

[88] De Graaf, Gevaarlijke Vrouwen, 273-74.

[89] Police Files Piranha, REL00: 57, 161; Roel Meijer, Inhoud Van De Religieuze En Ideologische Documenten Aangetroffen in Het Beslag Van Verdachten in Het

Piranha-Onderzoek, 1-74.

[90] Den Hartigh and Van Dam, Requisitoir Piranha Deel 1, 8; Groen and Kranenberg, Women Warriors for Allah, 134-35.

ISSN 2334-3745 81 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

The German Sauerland Cell Reconsidered


by Quirine Eijkman

Abstract
This Research Note examines the Sauerland terror plot, which is considered the most important homegrown
jihadist threat to Germany. It provides an in-depth description of the backgrounds of key associates of the cell,
their role in preparing the intended attacks and how the plot itself evolved between 2005 and 2007. The author
aims to provide readers with a primary-sources based case study that can inform their own research on the
Sauerland cell and European homegrown jihadism more generally. This piece also highlights the challenges
researchers can face when attempting to obtain permission to use judicial documents in academic publications.

Keywords: homegrown, jihadism, Sauerland cell, Germany

Introduction
In 2007, German police arrested four men suspected of preparing one or more terrorist attacks in Germany.
They have since become known as the Sauerlandgruppe (Sauerland cell), a reference to the region in mid-
western Germany where the four had been attempting to construct an explosive device in a holiday home.
The plot had its origins in a training camp run by the al-Qaeda linked Islamic Jihad Union (IJU)[1] on the
border region between Afghanistan and Pakistan where the four conspirators had travelled in 2006. Initially,
German nationals Fritz Gelowicz, Daniel Schneider and Attila Selek, together with Adem Yilmaz, a Turkish/
German national who had grown up in Germany, had undergone paramilitary training with the aim of
joining the jihad in Afghanistan. However, the IJU convinced them to return to Germany instead, where
they began preparing their intended attacks by assembling explosive devices. It was during this period that
they were discovered, as the United States National Security Agency (NSA) noticed veiled communications
between the IJU and unknown individuals in Germany.[2] The NSA alerted its German counterparts, who
promptly deployed a surveillance team code-named operation Alberich. Before three associates of the cell
could use their 26 military detonators and 12 barrels of hydrogen peroxidethe same chemicals also used for
the 2005 terrorist bombings in LondonGerman law enforcement officials intervened. The fourth associate,
Adem Selek, was arrested later in Turkey.[3]

This article provides an in-depth description of the backgrounds of the four key associates of the cell, their
role in planning and preparing attacks, how the plot was conceived and how it evolved between 2005 and
2007. There exist various academic accounts of the Sauerland cell, some of which have a similar focus as
the present Research Note.[4] Where this contribution differs, is in its attention to the groups origin and
evolution, made possible by the authors access to significant primary source materials. As such it has a clearly
different perspective than Stefan Malthaners recent study on the cells immediate social environment[5] or
Guido Steinbergs focus on the internationalisation of German Islamist terrorist groups.[6]

This Research Note also reflects some of the challenges that terrorism researchers face when attempting to
access, and especially to publish on, primary sources-based material. The present has been able to study
the Sauerland cell based on an the extended version of the German judicial verdict.[7] This source contains
considerable details of the events and the suspects, basing itself in large part on information from German
police files. Unfortunately, this extended version of the verdict is not in the public domain and permission
to cite it as a source in this Note was not granted. Instead, the shorter and less detailed but publically
available version of the judgment is relied upon as the most important primary source.[8] This material is

ISSN 2334-3745 82 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

complemented with information contained in existing academic articles and media reports.[9] While the
use of media sources raises questions of accuracy and reliability[10], the restrictions on using the full verdict
necessitated looking for alterative sources. However, as the author was able to review the extended version of
the judicial verdict, she was able to select those media reports that are most accurate and reliable.

As a summary of the most important aspects of the case against the Sauerland cell suspects, the abbreviated
judicial verdict is a useful resource. However, some drawbacks of working with this publicly available version
of the judgment must be acknowledged. First of all, it is focused on the four chief suspects, whereas in reality
many more people were to a greater or lesser extent involved in the plot. Secondly, even though three of the
key associates were caught in the act of mixing the ingredients for an explosive device, one can never be
sure that they would have actually committed a terrorist attack. Last but not least, the activities of foreign
or German intelligence and security services are hardly mentioned in the judgment, whereas several media
reports suggest that there was cooperation with the US Central Intelligence Agency (CIA), the National
Security Agency (NSA) and the Turkish secret service.[11] In short, this particular source should not be
utilised uncritically. Nevertheless, the abbreviated judicial verdict provides a solid foundation on which to
base this analysis.

An Overview of the Criminal Case, 2007-2010


On 4 September 2007, three young men were arrested in Germanys Sauerland region by the Federal Criminal
Police (Bundeskriminalamt, BKA) because they were suspected of preparing one or more terrorist attacks. A
fourth arrest followed on 6 November 2007 in Turkey. The authorities, who with the involvement of more
than 600 agents had kept tabs on the men for months, code-named the case operation Alberich. However,
this article will continue to refer to the group by the more commonly used designation Sauerland cell or
group. Its plot was considered by the German National Prosecution Services (Bundesstaatsanwaltschaft) to be
one of the most important homegrown jihadist terrorist plots.[12]

Two months after the criminal trial had begun at the Dsseldorf Higher Regional Court on 22 April 2009,
the suspects decided to confess. Thereafter the defense strategy changed from challenging (among other
issues) the states surveillance practices, to cooperation with the federal prosecutor. The suspects testimony
led to an additional 1,100 pages being added to the 521 folders of evidence that had been collected by law
enforcement officials during their 10-month long surveillance.[13] As the mens confessions matched the
findings of the extensive criminal investigation, the court judged the information to be generally trustworthy.
[14] Additionally, the testimony sheds further light on the period when the suspects stayed and trained
in Pakistan and detailing how the terrorist plot evolved. After a nine month long trial, the suspects were
convicted on 4 March 2010. They were sentenced to between five and 12 years imprisonment for, among
other charges, membership of a foreign terrorist organisation and conspiracy to commit murder.[15]

The Sauerland Cells Key Associates


The leader of the cell was Fritz Gelowicz (born in Munich, 1979). After his parents divorce in 1992, Gelowicz
lived with his father, an engineer.[16] His conversion to Islam began in the year he turned 16, in a period
defined by his rebellious behaviour. Under the influence of the older brother of a Turkish friend, Gelowicz
gravitated towards Islam. Although he adopted the Arab name Abdullah as part of his conversion in 1994
and was later circumcised, his religious views were initially moderate.[17]

These views gradually changed after the attacks of 9/11 and because of Gelowiczs growing interest in the

ISSN 2334-3745 83 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

armed struggle in Chechnya. He dropped out of school and lived on the dole. His views started becoming
more clearly radical in the summer of 2002, when he began attending radical sermons at a multicultural
community centre The Multi-Kultur-Haus in Neu-Ulm, which at the time was one of the main Salafist centres in
Germany.[18] Later in 2005 this centre was closed by the authorities because it was believed to have played an
important role in sending youngsters on a path of violent jihad. For instance, the Centre clearly sympathised
with the armed struggle of fellow Muslims in Chechnya and Iraq.[19] It was during this period that Gelowicz
embraced a fundamentalist, orthodox interpretation of Islam.[20] Not much later, around 2004, Gelowicz
also began to pursue his desire to join Islamist insurgents abroad. He was particularly inspired by the case
of Thomas Hamza Fischer, a German convert who was raised close to Ulm and whom he had known
personally. Fischer and others had gone to Chechnya to fight and die there between 2002 and 2003.[21]
Finally, late 2003 was an important moment because it was around that time that Gelowicz met at Ulms
multicultural community centre his future Sauerland co-conspirator Atilla Selek.

Attila Selek, a German national with Turkish parents, was born in Ulm in 1985. His parents were conservative
Muslims, but for many years he practised his religion only superficially and with little regularity.[22] Like
Gelowicz, Selek came to reorient himself on Islam through a friend. Selek also started attending the radical
sermons that were held at the multicultural community centre in Ulm. There he became friends with Fritz,
whom he came to see as his mentor.[23] Under Gelowiczs influence, Selek became more interested in Islam,
started praying daily and attending the mosque regularly. His behaviour also changed: he became quieter and
more withdrawn in his work as a car painter.[24] Selek developed a growing interest in violent jihad; he read
the literature Gelowicz gave him and started downloading videos of beheadings. When Gelowicz suggested
that they try to join Islamist militants as foreign fighters, Selek readily agreed. In September 2004, Selek gave
up his job, telling his employer that, for religious reasons, he could no longer work alongside women. He too
lived on government benefits from then on.[25]

The third associate of the Sauerland cell was Adem Yilmaz, who was born in Turkey in 1978 and holds both
Turkish and German citizenship. He moved to Germany to join his father in 1986. In the summer of 2001,
he met an older co-religionist and developed a more intense interest in Islam.[26] He followed media reports
and debates with other Muslims on the internet and his religious convictions became stronger. He took
an interest in publications by jihadist ideologues and in jihadist songs. In October 2002 he gave up his job
as a ticket inspector for the German Railways, for religious reasons. He lived on the dole, aside from one
brief period, until his arrest in September 2007.[27] By the end of 2002, the American War on Terrorism
motivated him to join Islamist militants and help them in their struggle against all those who were using
violence against Muslims.[28] Yilmaz decided to take part in the armed jihad in October 2003 and intended
to go to Chechnya, but he initially took no action. He met Gelowicz in January 2005, while both were making
their pilgrimage to Mecca. On the same trip he also encountered Selek, who was an old acquaintance of
Yilmaz. During their Hajj, the relationship between the three men became closer and they decided to join the
armed jihad in Chechnya or Iraq together.[29]

The fourth associate of the core Sauerland cell arrested in 2007 was Daniel Schneider, born in 1985. His
parents got divorced when he was eleven. Furious rows with his mother led Schneider to move in with his
father in November 2001. Initially he did well in school, but then dropped out of secondary school with one
year to go. He had begun to challenge authority at school, was convicted of various crimes and experimented
with alcohol and drugs. Starting at age thirteen, Daniel developed a strong interest in philosophical and
religious subjects. By the time he was sixteen, however, he had become an atheist. He spent some time in
the Amazon region, explaining that this enabled him to avoid contributing to the worldwide destruction of
nature.[30]

ISSN 2334-3745 84 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Another change in his worldview took place at the end of June 2004, when he converted to Islam after having
developed earlier an interest in the religion under the influence of an older Muslim friend.[31] He adopted
the Islamic name Jihad and sometimes prayed uninterruptedly at the mosque for several days at a time.
He also broke off his old friendships; all his new friends were Muslims. Influenced by media reports from
conflict zones around the world, he became interested in violent jihad.[32] In January 2005 he was called up
for German military service. He followed a three-month course in which he learned (among other things)
how to handle explosives.[33 In October 2005, he met Selek while attending a mosque in Germany, and
found him to be a kindred spirit. Two months later, he met Yilmaz through a mutual friend. Reports on the
abuse of inmates by American wardens in the Iraqi prison Abu Ghraib prompted Daniel to take action. He
decided to go abroad and to try to reach a jihadi training camp, with the aim of preparing himself for the
armed struggle.[34 His stay in Egypt to learn Arabic, from February to the end of May 2006, consolidated
these intentions.

Preparing for Armed Jihad Abroad


In the course of 2004 and 2005, these four core members of the Sauerland cell had developed a desire to
take part in armed jihad. They were also eager to undergo thorough preparation in a training camp. Their
initial attempts to reach such a camp were unsuccessful, but their efforts finally bore fruit at the beginning of
April 2006. Through a contact they had previously met in Syria in August 2005, Gelowicz and Yilmaz were
escorted to the Waziristan region on the border between Pakistan and Afghanistan. There they joined the
IJU, an Uzbek terrorist organisation with links to Al Qaeda.[35] Almost immediately after their arrival, both
men embarked on a course of paramilitary training. At the beginning of July 2006, Selek and Schneider also
arrived in Waziristan for training. It was there that Gelowicz and Schneider met for the first time.[36]

It soon became clear to them that they were not being trained by the IJU to fight in Pakistan or Afghanistan.
Instead, the purpose of the course was to equip the group with the knowledge and skills required to carry out
acts of terrorism in Germany. Although that was not why they had gone to Pakistan, all of the men eventually
accepted this assignment.[37] Selek was put in charge of liaison between the cell in Germany and the IJU
leadership. The IJU leadership issued the following guidelines for their operations in Germany: kill a large
number of Americans, include an Uzbek target on account of that country providing Germany with airfields
from which German troops in Afghanistan could be resupplied, and choose a target that sends a clear,
intimidating signal to the German population.[38]

Back Home: The Evolving Terror Plot


Selek returned to Germany in August 2006, Gelowicz and Yilmaz came back a month later while Schneider
did not make the journey home until February 2007.[39 As a result, Schneider missed the start of operational
preparations, which began in December 2006. Schneiders return had been delayed due to his detention in
Iran.[40]

Although all four associates eventually made it back to Germany, the cell was essentially compromised from
October 2006 onwards. At that point in time, the NSA had intercepted veiled communications between the
IJU in Pakistan and at that point not yet identified individuals in Germany. This prompted the NSA to alert
the German authorities.[41] This was also the period when Gelowicz was trying to implement his plans for
committing a terrorist attack. In the weeks following his arrival, at the beginning of October 2006, he made
as many as 216 visits to 68 phone shops in 12 cities. The goal was to conduct secure e-mail consultations
with the IJU leadership in Pakistan and to search online for ways of purchasing large quantities of hydrogen

ISSN 2334-3745 85 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

peroxide, which was to be used as main ingredient for an explosive device.[42] From December 2006 until
the arrests in September 2007, these internet searches led to the purchase of 12 barrels of chemicals, which
Gelowicz transported in a rented vehicle with false licence plates, most of the time under a false name and
in disguise, to a rented storage site.[43] In December 2006 Gelowicz also divided up tasks within the cell.
Yilmaz was put in charge of financial affairs, while Gelowicz and Selek were to bear joint responsibility for
purchasing and storing the required precursor chemicals for bomb making.[44]

On 31 December 2006, a government surveillance unit witnessed a car with Selek, Gelowicz and two others
driving back and forth several times past American barracks in Hanau. A few days later, one of the other
passengers purchased a digital alarm clock, adhesive tape and batteries. The police and the security service
concluded that the men had been snooping out a possible target and they expanded their surveillance
operation. On 6 January 2007, the police searched the homes of Selek, Gelowicz and the latters father, but did
not find anything significant.[45] This made it abundantly clear to Gelowicz and Selek that they had attracted
the German authorities attention.[46]

On 20 April 2007, the American embassy in Germany issued an official warning, urging heightened vigilance.
The warning was prompted by the interception of a coded message from Pakistan that the Kurds were
coming, although the authorities were not yet aware that Kurds was a code word for detonators.[47] At
the same time, German magazine Spiegel Online reported that the Kurds should be regarded as belonging
to the circles of the IJU and that those concerned must have undergone military training in Pakistan.[48]
In June, the German Ministry of the Interior issued a public warning about young German men who had
been trained in Pakistan and then returned to Germany, and it was reported in the media that the BKA was
investigating an Islamist cell in the Rhine-Main region that was planning attacks on American targets.[49]

Despite the fact that the Sauerland cell had attracted considerable attention from the authorities and
increasingly from the media too, Gelowicz did not see any reason to modify his plans or to temporarily
suspend the preparations.[50] In fact, he was so confident of the cells capabilities that he even gave a
telephone interview to the magazine Stern on 13 July 2007 which clearly reveals he was aware of the
authorities interest in him and his colleagues. In the interview, Gelowicz complained that he and others had
been baselessly labelled as Gefhrder[51], i.e. elements posing a threat to the state, and were being harassed
by the authorities because of their religion. He claimed that he posed no threat at all and asked to be left in
peace.[52]

A week later, on 20 July 2007, while Gelowicz and Yilmaz went to purchase chemicals, they made several
important operational arrangements. Yilmaz was to take over responsibility for communicating with the
IJU and one more order was to be placed for hydrogen peroxide.[53] The German investigative and security
services, which were by then well informed of the cells communications and activities, went into action once
the purchases had been made. They secretly replaced the barrels containing 35% strong hydrogen peroxide
which the cell had bought with barrels containing the chemicals in a concentration of only 3%, too thin to
serve as basis for an explosive device.[54]

At the beginning of August, Gelowicz acquired six detonators through a criminal contact while the IJU
consignment of another twenty detonators finally also arrived at the end of the month.[55] On 3 September
the men purchased the materials needed to make the explosives and the bombs in which they would be
used.[56] In addition, Gelowicz went to an internet caf where he printed out the bomb-building notes he
had made in Waziristan. The three men agreed that they would choose a target once they had carried out a
successful trial detonation.[57 In spite of their IJU handlers order that an Uzbek target had to be included,
the cell appears to have settled on the idea of attacking three American targets.[58]

ISSN 2334-3745 86 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

On the way back from making their purchases in early September, the men happened to be stopped by
German traffic police. One officer who went back to his car to check their personal details remarked, in a
voice that carried to the three men, that they were known to the German federal police. After this check,
the men were allowed to go on their way. It is striking that the men did not decide, given what they had just
overheard, to stop or postpone their preparations for the attacks.[59] Thus, on the morning of 4 September,
Gelowicz, Yilmaz and Schneider started boiling the hydrogen peroxide in order to raise the concentration to
a level suitable for bomb-making.[60] Because the German police had swapped the chemicals, this did not
lead to the expected results. The suspects thought that the problem must be due to rusty pans and decided to
buy new ones. However, they did not have time to do so since all three were arrested by a special police squad
that afternoon. This brought the Sauerland groups preparations for terrorist attacks to an abrupt end.[61]

Conclusion
This Research Note focused on the Sauerland cell, considered the most significant homegrown jihadist
terrorist threat to Germany to date. A case, moreover, that reflects an interesting mixture of the local and the
global; while the decision to prepare for attacks in Germany was made by the cells contacts in the Waziristan-
based IJU, the cells members themselves were in many ways exemplary of the homegrown jihadist
phenomenon.

The writing of this Note illustrates some of the difficulties that an author can face when trying to utilise state-
owned primary sources for research on terrorism. In this case, the author was able to consult the extensive
judicial verdict on the Sauerland cell but not allowed to cite from it. Instead, she had to rely on a considerably
less detailed public version of the verdict as well as media reports and academic publications. While state
agencies privacy and national security concerns are valid, the more detailed and robust research on terrorism
that access to such sources enables can also work to their benefit. It is therefore to be hoped that the future
will see more opportunities to work with the rich primary sources on terrorism that state agencies frequently
possess.

Acknowledgements: The author would like to thank Petter Nesser and Bart Schuurman for much
appreciated feedback.

About the Authors: Quirine Eijkman (PhD, Utrecht University) is a Senior-Researcher/Lecturer at the CTC.
Her research focuses on the (side) effects of security governance on human rights, transitional justice and the
sociology of law.

Notes
[1] US Department of State, Country Reports on Terrorism: Foreign Terrorist Organizations, (Washington, D.C.: Office of the Coordinator for Counterterrorism,

2012).

[2] Andrew Purvis, U.S. Helped Nab German Suspects, TIME Magazine (14 September 2007).

[3] Yassin Musharbash and Marcel Rosenbach, The Sauerland Cell in the Dock: Germany Prepares for a Homegrown Terror Plot, Spiegel Online (16 April 2009);

Holger Stark, The Fourth Man: Suspect in German Bomb Plot Tells his Story, Spiegel Online (15 November 2007).

[4] Stefan Malthaner, Contextualizing Radicalization: the Emergence of the Sauerland-Cell from Radical Networks and the Salafist Movement, Studies in Conflict

& Terrorism (2014), accepted for publication; Guido W. Steinberg, German Jihad: On the Internationalization of Islamist Terrorism (New York: Columbia University

Press, 2013); Stefan Malthaner and Klaus Hummel, Islamistischer Terrorismus und Salafistische Milieus [Islamist Terrorism and Salafist Environments], in:

Radikale Milieus: Das soziale Umfeld Terroristischer Gruppen, eds. Stefan Malthaer and Peter Waldmann (London & New York: Campus, 2012); Martin Schuble,

ISSN 2334-3745 87 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Dschihadisten: Feldforschung in den Milieus [Jihadists: Fieldwork in the social setting] (Berlin/Tbingen: Schiler Hans Verlag, 2011).

[5] Malthaner, Contextualizing Radicalization.

[6] Steinberg, German Jihad.

[7] The CTC received written permission from the German Federal Prosecutors Office to use the extended anonymous verdict on 31 July 2012 for a research

project (Oberlandesgericht Dsseldorf. 6 Strafsenat, Urteil in der Strafsache gegen Fritz Gelowicz u.a., [Verdict in the Case against Fritz Gelowicz (et al.)];

Oberlandesgericht Dsseldorf, III-6 StS 11/08 u. III-6 StS 15/08, 2 StE 7/08-4 u. 2 Ste 9/08-4, Germany, 24 June 2010). In accordance with the terms of use, on 12

May 2014 they contacted the German Federal Prosecutors Office for permission to publish an academic article on the basis of this verdict. Unfortunately, this was

denied (phone call 14 May 2014).

[8] Oberlandesgericht Dsseldorf. 6 Strafsenat, Mndliche Urteilsbegrndung in der Strafsache gegen Fritz Gelowicz u.a., [Oral Verdict in the Case against Fritz

Gelowicz (et al.)]; Oberlandesgericht Dsseldorf, III-6 StS 11/08 u. III-6 StS 15/08, 2 StE 7/08-4 u. 2 Ste 9/08-4, Germany, 4 March 2010, 1-11.

[9] Petter Nesser, Jihad in Europe: Patterns in Islamist Terror Cell Formation and Behaviour, (Oslo: University of Oslo, 2011); Rolf Celement and Paul Elmar Jris,

Die Terroristen von Nebenan: Gotteskrieger aus Deutschland [Next Doors Terrorists: Gods Warriors from Germany] (Munich: Piper, 2009); Martin Knobbe,

Terrorverdchtiger Fritz Gelowicz. Interview mit einem Gefhrder, [Terror Suspect Fritz Gelowicz. Interview with a Gefhrder] Stern.de (13 September 2009);

Yassin Musharbash, The Sauerland Cell Testifies: Jihadists Describe Hatred of US as Reason for a Terror Plot, Spiegel Online (12 August 2009); Markus Bickel, Auf

Den Spuren Der Kofferbomber. Prozess Gegen Sauerland-Gruppe, [Traces of the Suitcase Bombers: The Trial Against the Sauerlandgroup] Frankfurter Algemeine

(22 April 2009); Marcel Rosenbach and Holger Stark, The Bomb Plot: Terror from the German Mainland, Spiegel Online (4 September 2008); Stark, The Fourth

Man; Peter Carstens, Die Mosaiksteinchen Passen Zusammen, [The Mosaic Pieces Fit Together] Frankfurter Algemeine Zeitung (22 June 2007).

[10] Andrew Silke, Holy Warriors: Exploring the Psychological Processes of Jihadi Radicalization, European Journal of Criminology 5, no. 1 (2008) 100-101;

John Horgan, The Case for Firsthand Research, in Research on Terrorism: Trends, Achievements and Failures, ed. Andrew Silke (London / New York: Frank Cass,

2004) 30; Bart Schuurman and Quirine Eijkman, Moving Terrorism Research Forward: the Crucial Role of Primary Sources, ICCT Background Note (The Hague:

International Centre for Counter-Terrorism 2013) 1-13.

[11] Steinberg, German Jihad, 74 and 103-104; Reiner Nbel, Mutmasslicher CIA-Mann War Der Chef, Stern.de (4 February 2009); Martin Knobbe, Welche

Rolle spielten die Geheimdienste?, [Which Role did the Secret Services play?] Stern.de (4 March 2010); Four Men Stand Accused of German Terror Plot, Spiegel

Online (22 april 2007).

[12] Schlimmer Als London Und Madrid, [Worse than London and Madrid] Zeit Online (5 September 2007).

[13] Mndliche Urteilsbegrndung in der Strafsache gegen Fritz Gelowicz u.a. 2010, 4; Musharbash and Rosenbach, The Sauerland Cell in the Dock.

[14] Mndliche Urteilsbegrndung in der Strafsache gegen Fritz Gelowicz u.a. 2010, 9-10.

[15] Dsseldorf Oberlandesgericht, Sauerland-Verfahren: Gericht verhngt langjhrige Freiheitsstrafen. Pressemitteilung Nr. 09/2010 Vom, 4 March 2010 /

Mndliche Urteilsbegrndung in der Strafsache gegen Fritz Gelowicz u.a. 2010.

[16] Terroralarm in Deutschland: Die Bombenbauer aus der Provinz, [Terror Alarm in Germany: The Bombmaker from the Province], Spiegel Online (7

September 2007).

[17] N-TV, Sauerland-Prozess: Fritz G. erzhlt weiter, [Sauerland Trial: Fritz G. Recounts] (11 September 2009); Rosenbach and Stark, The Bomb Plot.

[18] Malthaner, Contextualizing Radicalization, 9-11; Mndliche Urteilsbegrndung in der Strafsache gegen Fritz Gelowicz u.a. 2010, 3-4; Musharbash, The

Sauerland Cell Testifies; Rosenbach and Stark, The Bomb Plot.

[19] Malthaner, Contextualizing Radicalization, 9-11.

[20] Ibid., 9-12 / Fritz Gelowicz gibt sich als tief religiser Muslim, [Fritz G. Is a deeply religious Muslim] Die Welt (11 August 2009).

[21] Malthaner, Contextualizing Radicalization, 11; Steinberg, German Jihad, 63-66.

[22] Malthaner, Contextualizing Radicalization, 10-11; Stark, The Fourth Man.

[23] Steinberg, German Jihad, 61-62; Mndliche Urteilsbegrndung in der Strafsache gegen Fritz Gelowicz u.a. 2010, 5.

[24] Steinberg, German Jihad, 61-62; Stark, The Fourth Man.

ISSN 2334-3745 88 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

[25] Steinberg, German Jihad, 62.

[26] Mndliche Urteilsbegrndung in der Strafsache gegen Fritz Gelowicz u.a. 2010, 5.

[27] Steinberg, German Jihad, 60-61.

[28] Mndliche Urteilsbegrndung in der Strafsache gegen Fritz Gelowicz u.a. 2010, 5; Musharbach, The Sauerland Cell Testifies.

[29] Malthaner, Contextualizing Radicalization, 16; Nesser, Jihad in Europe, 477; Musharbach, The Sauerland Cell Testifies.

[30] Martin Knobbe, Der Sauerland Bomber: Aus dem Leben Eines Terroristen [The Sauerlandbomber: The Life of a Terrorist], Stern.de (22 April 2009).

[31] Steinberg, German Jihad, 60; Mndliche Urteilsbegrndung in der Strafsache Gegen Fritz Gelowicz u.a., 5.

[32] Knobbe, Der Sauerland Bomber.

[33] Steinberg, German Jihad, 89.

[34] Knobbe, Der Sauerland Bomber.

[35] Steinberg, German Jihad, 11-12; US Department of State, Country Reports on Terrorism; Guido W. Steinberg, A Turkish Al-Qaeda: The Islamic Jihad Union

and the Internationalization of Uzbek Jihadism, Strategic Insights 7:3 (2008) 1-10.

[36] Steinberg, German Jihad, 67-70; Mndliche Urteilsbegrndung in der Strafsache Gegen Fritz Gelowicz u.a., 5.

[37] Strafsenat, G. U.A. Mndliche Urteilsbegrndung; Rosenbach and Stark, The Bomb Plot.

[38] Steinberg, German Jihad, 89; WikiLeaks, ArticleI. Cabelgate:IJU (2009).

[39] Malthaner, Contextualizing Radicalization, 20; Steinberg, German Jihad, 71-72.

[40] Malthaner, Contextualizing Radicalization, 20; Knobbe, Der Sauerland Bomber; Terroralarm in Deutschland.

[41] Steinberg, German Jihad, 89; Purvis, U.S. Helped Nab German Suspects.

[42] Mndliche Urteilsbegrndung in der Strafsache gegen Fritz Gelowicz u.a., 6-7; Knobbe, Der Sauerland Bomber.

[43] Mndliche Urteilsbegrndung in der Strafsache Gegen Fritz Gelowicz u.a., 6-7.

[44] Ibid.; Portrts: Die vier Veurteilen [Portraits of the Four Convicts], FOCUS Online (4 March 2010).

[45] Steinberg, German Jihad, 75-76; Knobbe, Terrorverdchtiger Fritz Gelowicz.

[46] Knobbe, Terrorverdchtiger Fritz Gelowicz; Martin Knobbe, Rainer Nbel and Regina Weitz, Terrorismus in Deutschland. Die Spur Der Gefhrder,

[Terrorism in Germany: The Trail of a Gefhrder], Stern.de (25 juli 2007).

[47] Craig Witlock, U.S. Issues Warning on Terrorism in Germany, The Washington Post (21 April 2007); Marcel Rosenbach, Holger Stark and Simone Kaiser,

Operation Alberich, Der Spiegel (10 September 2007.

[48] Terrordrohung. Cia Warnt Deutsche Behrden Vor Islamisten, [Terrorism: The CIA Warns Autorities for Islamists] Spiegel Online (21 April 2007).

[49] Terrorwarnung: Hanning Warnt Vor Rckkehr Der Dschihadisten, [Hanning Warns for the Return of Jihadists] Spiegel Online (22 July 2007).

[50] Steinberg, German Jihad, 75-76; Schuble, Dschihadisten; Carstens, Die Mosaiksteinchen Passen Zusammen; Wikileaks, ArticleI. Cabelgate:IJU.

[51] The concept of Gefhrder is used by the German security and law enforcement services for referring to people who are likely to become involved in significant

political crimes. Bundestag, Schriftliche Fragen mit den in der Woche vom 20. November 2006 eingegangenen Antworten der Bundesregierung, (2006) 6.

[52] Knobbe, Terrorverdchtiger Fritz Gelowicz.

[53] Ibid.

[54] Mndliche Urteilsbegrndung in der Strafsache Gegen Fritz Gelowicz u.a., 2, 7.

[55] Ibid., 7.

[56] Ibid., 8.

[57] Ibid., 7.

ISSN 2334-3745 89 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

[58] Steinberg, German Jihad, 74; Mndliche Urteilsbegrndung in der Strafsache Gegen Fritz Gelowicz u.a., 1, 6, 10.

[59] Mndliche Urteilsbegrndung in der Strafsache Gegen Fritz Gelowicz u.a., 8

[60] Yassin Musharbash and Esther Wiemann, Terrorprozess: Chemikalien-Hndler der Sauerlandgruppe belieferte private Bombenbauer [Terror Trial: Chemical

Handler of the Sauerland Group provided for a PrivateBomb], Spiegel Online (29 April 2009).

[61] Mndliche Urteilsbegrndung in der Strafsache Gegen Fritz Gelowicz u.a., 8.

ISSN 2334-3745 90 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Operation Pendennis: A Case Study of an Australian Terrorist Plot


by Bart Schuurman, Shandon Harris-Hogan, Andrew Zammit and Pete Lentini

Abstract
This Research Note article provides a case study of a major Australian terrorist investigation, code-named
Operation Pendennis. Drawing primarily from publicly available court transcripts, this study seeks to expand
upon the growing literature within terrorism studies which utilises primary source materials. Its aim is to
provide a detailed overview of Operation Pendennis that might serve as a resource for other scholars. The work
also aims to add to existing knowledge regarding how terrorists prepare their attacks and react when under
surveillance. This is done by providing a descriptive account of two cells preparations for an act of terrorism, and
their unsuccessful attempts to evade authorities.

Keywords: homegrown, jihadism, Australia

Introduction
Given the ongoing need for detailed and primary sources-based accounts of terrorist incidents, this Research
Note provides a case study of Operation Pendennis.[1] Operation Pendennis was Australias longest running
terrorism investigation, culminating in the arrest of two self-starting militant Islamist cells in late 2005.
This account primarily uses information drawn from publicly available court transcripts of the associated
prosecutions and interviews with two public prosecutors involved in the Pendennis case. Drawing from such
sources allows for the creation of a more accurate account of events than those currently provided by news
and media sources, which are often marred by errors or may uncritically accept claims made by either the
prosecution or defence. Rather than detailing the radicalisation processes of the individuals involved, which
are addressed elsewhere [2], this analysis specifically focuses on the participants activities to further their
plot, and their attempts to evade state surveillance. The primary source material provides unique insights into
how these terrorists acted both to maintain operational security and to advance their operation.

Islamist terrorism has been a small but persistent threat in Australia. Prior to Pendennis, Australia
experienced an unsuccessful al-Qaeda and Jemaah Islamiyah-guided conspiracy to bomb Israeli and Jewish
targets during the 2000 Sydney Olympics while a Lashkar e-Toiba (LeT) guided plot was foiled in Sydney
in 2003. A Melbourne-based self-starting cell which had planned to attack Holsworthy Army Barracks was
foiled in 2009. In addition, militant Islamists from Australia have participated in training or combat overseas,
mainly in Afghanistan and Pakistan between 1999 and 2003, Lebanon throughout the 2000s, Somalia from
2007 onwards, and more recently in Yemen and Syria.[3] However, of the 23 people who have been convicted
in Australia for Islamist-related terror offences, 18 were arrested in Operation Pendennis. Moreover, several
subsequent terrorism-related investigations in Australia have involved the family, friends and associates of
the Pendennis men[4]. Given the significance of this operation, Pendennis provides a useful case study into
the broader phenomenon of Islamist terrorism in Australia.

A Brief Overview of Operation Pendennis


Operation Pendennis was a joint Victoria Police, New South Wales Police, Australian Federal Police (AFP)
and Australian Security Intelligence Organisation (ASIO) investigation which began in 2004. The operation
resulted in a series of arrests between November 2005 and March 2006, which led to terrorism charges being

ISSN 2334-3745 91 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

brought against thirteen suspects in Melbourne and nine in Sydney.

In Melbourne nine men were ultimately convicted on a range of terrorism offences, with two pleading guilty
and seven found guilty at trial. These nine men had an average age of 26 at the time of their arrest, with
the eldest member (Abdul Nacer Benbrika) aged 45 and the youngest member just 20.[5] Most of the cell
was new to Islamist militancy, with the exception of one who had trained in al-Qaedas al-Faruq camp in
Afghanistan in 2001, though he did not play a leading role in the cells activities.[6] Only two of the men had
completed secondary education, while two others were known to have a previous criminal record. Seven of
the men were of Lebanese origin, while Benbrika hailed from Algeria.[7] The other man (Shane Kent) was
a Caucasian Australian who was also the only convert within the cell.[8] However, the groups radicalisation
was certainly a home-grown phenomenon; seven of the nine were born in Australia, while another
immigrated as a child. Seven were married at the time of their arrest whilst four also had children.[9] Indeed,
it has been noted that this level of family commitment impacted the amount of time several members were
able to dedicate to the cell.[10] Court documents describe Benbrika as very much the leader and religious
authority of the cell, whose teachings centred upon the The Call to Global Islamic Resistance written by Abu
Musab al-Suri.[11] Aimen Joud and Fadl Sayadi fulfilled important roles as his deputies.[12]

By 2010, all nine Sydney men were convicted, with four pleading guilty and five found guilty at trial. In
contrast to the Melbourne cell, the Sydney group was far older and more experienced. The average age of the
cell was 29 with only one member aged below 24 at the time of their arrest.[13] There are also indications
that up to four members of the Sydney cell had previously trained in Lashker-e-Toiba camps in Pakistan
between 1999 and 2001, though only one case was proven in court.[14] Like the Melbourne cell, only two
men had completed secondary level education and two also held a previous criminal record. Once again like
in the Melbourne cell, eight of the nine Sydney cell members were married and all but two had children. Five
of the Sydney men also shared a Lebanese background, while the four others were of Bangladeshi, Bosnian,
Jordanian and Anglo-Indonesian background.[15] Born in Lebanon and raised in Australia, Mohammed
Elomar was described in court as the puppet master of the Sydney cell. His leadership role was explicitly
stated by the judge as the reason for sentencing Mohammed to the longest term of incarceration of any of the
men from either cell.[16]

The 18 men convicted in total were members of two distinct terrorist cells which planned to carry out
violence against the Australian government, motivated primarily by Australias participation in the wars in
Afghanistan and Iraq. They were inspired by al-Qaeda and its narrative, with their leader citing terrorist acts
committed by mujahideen around the world, including the bombings in New York and Washington, Bali,
Madrid, Jakarta, London and Iraq, as exemplars to be admired and emulated.[17] The relatively high number
of individuals from or with links to Lebanon is an interesting feature of the Operation Pendennis suspects
and reflects a broader feature of militant Islamism in Australia.[18]

The Sydney cell was the more advanced of the two groups, having amassed firearms, ammunition, detonators,
chemicals, laboratory equipment and bomb-making instruction manuals. When sentencing five members
of the cell, the judge noted that absent the intervention of the authorities, the plan might well have come
to fruition in early 2006 or thereabouts. The materials were to hand and recipes for the construction of
explosives were available.[19]

By contrast, the Melbourne cells activities were less directly operational and largely supportive in nature.
Their actions involved fund-raising (including through fraud and theft), acquiring bomb-making
instructions and other extremist materials, attempting to acquire firearms, exploring the acquisition of
explosives, undertaking training and bonding trips, and cooperating closely with the Sydney cell on a range

ISSN 2334-3745 92 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

of activities.[20] Members of the Melbourne cell were convicted for knowingly forming a group directly or
indirectly engaged in preparing or fostering the doing of a terrorist act[21], not for planning a specific attack
themselves.

The Melbourne cell had been formed under the guidance of the aforementioned Benbrika, a sheikh without
any formal religious education.[22] The Sydney cell was formed independently of the Melbourne cell, but
from at least August 2004 onwards the two groups were in regular communication. Benbrika frequently
visited Sydney members, becoming the religious authority for both of the cells, and individuals from the
Sydney cell also spent time in Victoria.[23] However, while the Melbourne cell was predominantly made up
of newly-radicalised individuals drawn towards Benbrika, several of the Sydney men were associated

sometimes directly and sometimes through friends and family with terrorist activity in Lebanon or with
earlier plots in Australia (including the 2000 Roche plot and the 2003 LeT plot).[24] This distinction would
come to influence the progress of the plot and different practices of the two cells.

Practical Preparations
Up until the beginning of 2005 the Melbourne cells activities were largely confined to gathering propaganda
and instructional material, and acquiring income for the groups sandooq (literally coffer or [war]chest).
Although all members of the cell were expected to make regular contributions towards the sandooq, the
group mainly generated income through stealing cars and selling off the parts. The practical preparations for
terrorist activities were predominantly undertaken by the Sydney cell.

The Sydney cell appeared to have had a basic understanding of the materials required to construct explosives,
but faced difficulties acquiring precursors. While some of this was material was acquired relatively easily,
including railway detonators and instructional material (they possessed step-by-step instructions for
manufacturing TATP and HMTD), laboratory equipment and chemicals proved more difficult to procure.
[25] Throughout early 2005 members of both the Sydney and Melbourne cells, using false names, attempted
to acquire laboratory equipment via a Victorian based supplier. However, fearing possible police surveillance,
they did not collect the goods. Despite this setback, in July 2005 the Sydney cell did manage to obtain a small
consignment of glassware.[26]

From June 2005 onwards, the Sydney cell also tried to purchase several of the chemicals required to build
explosives. However, several merchants were suspicious of their intended purchases and either dissuaded
them from attempting to make the purchases or informed authorities of customers whose interests in their
wares alarmed them. Yet the group eventually obtained many litres of distilled water, acetone, hydrogen
peroxide and hydrochloric acid.[27] In October, one of the suspects also tried to steal a large quantity of
batteries and clocks (to be used as timers) but was foiled by store security.[28]

During 2005, members of the Sydney cell also purchased large quantities of 7.62mm ammunition, totalling
nearly 20,000 rounds. Although the cells operational leader, Mohamed Ali Elomar was legally in possession
of several firearms, only one (a bolt-action rifle) was capable of firing 7.62 mm ammunition. When
sentencing Elomar, the judge noted that the ammunition was to have been used in other automatic or
semi-automatic weaponry.[29] The group was never found to be in the possession of such weaponry, but
prosecutors suspected that the Sydney suspects managed to hide one or more AK-47s before their arrest.[30]
The group also attempted to construct improvised explosives, using gunpowder from rifle cartridges.

As previously noted, the Melbourne cell had only a limited operational role, and primarily concerned itself

ISSN 2334-3745 93 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

with support activities. Though Benbrikas immediate inner-circle hoped to use their sandooq to purchase
materials, they abandoned this plan because of lack of funds. Indeed, the group largely proved amateurish
and acquired little material of practical use beyond their vast collection of propaganda and bomb-making
manuals.[31] One of the groups members was arrested for credit card fraud, and on multiple occasions
senior members of the cell lamented that many of the members did not demonstrate sufficient discipline and
that this threatened the cells existence and prospects. A planned team-building weekend failed when they
arrived at the location late, disturbed local residents, and had to cancel the event and return to Melbourne.
[32] When several Melbourne members attended a weekend organised by the Sydney group in March
2005, the contrast in progress and professionalism was stark. Sydney members had organised weapons and
ammunition for large-scale shooting practice, and the police later found evidence of possible experiments
with explosives.

Indeed, following this exposure one member of the Melbourne cell suggested Benbrika move to Sydney
to further the groups progress.[33] However, Benbrikas main focus remained on completing the religious
education of the Melbourne men, imparting his understandings of jihad and martyrdom. Following a series
of police raids in Sydney (in June and August) and in Melbourne (June) Benbrika came to believe that his
arrest was imminent. This prompted him to speed up his dissemination of the ideas in al-Suris book and he
began to advise the more trusted members of the group to be willing to act independently of him.[34]

No Clear Target
Despite media speculation on the subject, there remain no strong indications that the Melbourne cell had
selected any specific targets. Although one of the suspects stated at trial that Benbrika was interested in
attacking major sports events, no significant evidence was found to corroborate this. Moreover, the judge
noted that this suspect had a track record of making false claims. During a police raid in November 2005
police did recover the floor plans of several government buildings in Melbourne, but it remains likely that no
specific target was ever selected.[35]

Similarly, there is no direct evidence that the Sydney cell had selected a specific target. However, there are
indications that the group may have explored the possibility of attacking the Lucas Heights nuclear reactor.
These suspicions derive from an investigation into the theft of a number of rocket launchers from the
stockpiles of the Australian Army. During the separate trial of a man named Taha Abdul-Rahman (who was
later convicted for his role in selling the stolen weapons) a police statement alleged that he sold five of the
rocket launchers to Sydney cell leader Mohamed Ali Elomar. The statement claimed Elomar had stated an
intention to blow up the nuclear place.[36] Moreover, three members of the Sydney cell were intercepted
within the restricted area surrounding the facility.[37] However, at no stage during the Sydney trial did the
prosecution contend a specific target had been chosen and the rocket launchers allegedly sold to Elomar have
never been recovered.[38]

From the sources available, it can be concluded that the two cells did not progress beyond attempting to
acquire the materials required for an act of terrorism to the selection of a specific target.

The Role of the Infiltrator SIO39


One early component of the Pendennis investigation involved the infiltration of Victoria Police Special
Intelligence Officer 39 (SIO39) into the Melbourne cell.[39] Posing as a Turkish man named Ahmet Sonmez,
SIO39 began attending Benbrikas religious classes in May 2004.[40] By September 2004 he had gained

ISSN 2334-3745 94 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

the confidence of the sheikh to such a degree that he was invited into his home. During this encounter
SIO39 feigned regret concerning his ownership of Coca-Cola shares, and casually referred to his purported
experience using explosives while working in the construction industry. Benbrikas response was to explore
SIO39s views regarding jihad and inquire about the idea of using SIO39s knowledge of explosives to do
something in Australia.[41]

In October of that year, Benbrika accompanied SIO39 to a nature reserve to the north of Melbourne where
SIO39 detonated a small quantity of explosives in a demonstration to Benbrika. Benbrika then asked SIO39
what quantity would be necessary to destroy a building, and the pair discussed the practical and financial
aspects of obtaining the materials to make bombs of this kind.[42]

However the undercover officers role ended shortly afterward. By late 2004, several core members began
expressing suspicions regarding SIO39, with Benbrika coming to share their view. This led Benbrika to make
a number of statements to wrong-foot the Australian authorities and SIO39, announcing that he had changed
his mind and that jihad in Australia was not permissible after all.[43] However, when sentencing Benbrika
the judge noted that, if Benbrika was cautious in his dealings with SIO39, this was in complete contrast to his
open encouragement of the members of the group to engage in terrorism.[44]

Concealment Activities
The Melbourne cells suspicions that they were under police surveillance somewhat stifled their planned
activities. Fundraising slowed significantly following a series of police raids which uncovered stolen cars,
propaganda, bomb-making manuals and several thousand Australian dollars.[45] Over time cell members
also began to suspect that their phones were being tapped, and constantly discussed their concern that they
might be arrested for what they were planning. There was also great concern among the group regarding
potential informants within the local Muslim community, although Benbrika repeatedly refused requests to
subject suspected informants to ill-treatment.[46]

Despite the groups compromised position, the Melbourne cell did continue their activities and preparations
(albeit in a more limited fashion). One member even tried to purchase firearms on the black market. This
continuation may have been related to the fatalistic views of Benbrika, who preached that the groups actions
would either manifest in a successful attack or continue from prison. Notably, Benbrika did exercise patience
in his movements towards this goal, pushing back against group members who were constantly pestering him
about when the cell was finally going to do something. Some threatened to split from the group in order to
speed up activities. At the end of October 2005 Benbrika appeared to want to pause the groups activities in
order to lessen the attention placed on them by authorities, but this proved impossible due to the impatience
of group members.[47]

The Melbourne cell also made some limited efforts to implement operational security measures. However,
their execution of these was amateurish at best.[48] While they often used code words because they feared
their phones were tapped, on one occasion one member openly exchanged an SMS message with an arms
dealer about a prospective weapons purchase, possibly unaware that SMS messages could be intercepted. The
groups system of code words for communicating via telephone was also compromised on several occasions
when members of the cell either did not understand the words, or forgot to use them. Despite being aware
that the group was under surveillance, Benbrika even agreed to be interviewed on national television, later
declaring triumphantly that he had fooled the interviewer.[49]

In contrast, the Sydney cells counter-surveillance efforts were implemented with more professionalism. They

ISSN 2334-3745 95 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

used a range of disposable mobile telephones registered under false names, ordered goods under fictitious
names, and whispered whenever discussing anything particularly incriminating.[50] The group also often
switched the cars used to pick up equipment, and registered the vehicles under other peoples names.[51] It
was the implementation of counter-surveillance measures, coupled with an imminent fear of potential arrest
that created difficulties for the group when attempting to obtain laboratory equipment and chemicals.[52]
However, these countermeasures did not prevent police searches conducted in June and August of 2005 from
uncovering firearms, large quantities of ammunition, extremist literature and bomb-making manuals.

Arrests
Fearing imminent arrest, in October 2005 the Sydney cell commenced attempts to erase any tracks of
what they had been planning. To this end members purchased hollow PVC tubes for the storage of goods
underground. The suspicion that the cell buried a range of incriminating materials and weaponry is
somewhat reinforced by the fact that one member made enquiries with a large number of estate agents
regarding remote pieces of land in October. Two other men also rented powerful metal detectors, possibly
used to test whether they would be able to retrieve the concealed items. Prosecutors also believed that the
Sydney group possessed a remote safe house.[53] The cell members fears of arrest proved well-founded, as
the plotters were arrested in a series of raids on 8 November 2005. During one arrest, there was an exchange
of gunfire between the police and the suspect which resulted in both the suspect and a police officer suffering
gunshot wounds.[54]

Conclusion
This Research Note provided a brief case study of a major terrorist plot within Australia. Drawing primarily
from publicly available court transcripts, the case study sought to expand the growing literature within
terrorism studies that is based on primary source material and act as a resource for other scholars. The case
study also sought to add to knowledge of how terrorists prepare for prospective attacks and react when under
surveillance, by providing a descriptive account of the two cells, their preparations and their unsuccessful
attempts to evade authorities. It showed how the two cells operated under the guidance of a single spiritual
leader who influenced members towards preparing for an attack targeting the Australian government. Their
preparations and security precautions were unsuccessful and often amateurish, particularly in the case of the
Melbourne cell. While the Sydney cell progressed much further in their practical efforts, neither cell reached
a point where an attack could be considered imminent, due to their incompetence as well as a result of
effective pre-emptive actions by authorities.

About the Authors: Bart Schuurman (MA, Utrecht University) is a researcher and PhD student at the Cen-
tre for Terrorism and Counterterrorism (CTC) at Leiden Universitys Campus The Hague in The Netherlands.
Shandon Harris-Hogan (MA, Monash University) is a Research Fellow of the Global Terrorism Research
Center at Monash University, Australia. Andrew Zammit (MA, Monash University) is a Researcher at the
Global Terrorism Research Center at Monash University, Australia. Pete Lentini (BA, Rhode Island; PhD, Glas-
gow) is Associate Professor, Departmentof Politics and International Relations,and Foundation Director, Global
Terrorism Research Centre (GTReC), Monash University.

Notes
[1] Marc Sageman, The Stagnation in Terrorism Research, Terrorism and Political Violence Vol. 26, No. 3, September-October 2014: 8.

ISSN 2334-3745 96 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

[2] Pete Lentini, Antipodal Terrorists? Accounting for Differences in Australian and Global Neojihadists, in Richard Devetak and Christopher W. Hughes

(eds.), The Globalization of Violence: Globalizations Shadow (London: Routledge, 2008), 188-210; Sam Mullins, Islamist Terrorism in Australia: An Empirical

Examination of the Home Grown Threat, Terrorism and Political Violence 23, no. 2 (2011): 254-85; Louise E. Porter and Mark R. Kebbell, Radicalization in

Australia: Examining Australias Convicted Terrorists, Psychiatry, Psychology and Law 18, no. 2 (2010): 212-31; Shandon Harris-Hogan, Australian Neo-Jihadist

Terrorism: Mapping the Network and Cell Analysis Using Wiretap Evidence, Studies in Conflict & Terrorism 35, no. 4 (2012): 298-314; Shandon Harris-Hogan,

Anatomy of a Terrorist Cell: A Study of the Network Uncovered in Sydney in 2005, Behavioral Sciences of Terrorism and Political Aggression 5, no. 2 (2013): 137-54;

Andrew Zammit, Who Becomes a Jihadist in Australia? A Comparative Analysis, Paper Presented to Understanding Terrorism from an Australian Perspective:

Radicalisation, De-Radicalisation and Counter Radicalisation (Melbourne, Monash University Caulfield Campus, 2010), 1-21.

[3] Andrew Zammit, Explaining a Turning Point in Australian Jihadism, Studies in Conflict & Terrorism 36, no. 9 (2013): 739-55.

[4] Shandon Harris-Hogan, The Importance of Family: The Key to Understanding the Evolution of Jihadism in Australia, Security Challenges 10, no. 1 (2014):

31-49.

[5] Supreme Court of Victoria, R v Benbrika & Ors [2009] VSC 21, (3 February 2009).

[6] Supreme Court of Victoria, R v Kent [2008] VSC 431, (20 October 2008), 3.

[7] Supreme Court of Victoria, VSC 21.

[8] Supreme Court of Victoria, VSC 431.

[9] Supreme Court of Victoria, VSC 21.

[10] Harris-Hogan, The Importance of Family, 31-49.

[11] Pete Lentini, Neojihadism: Towards a New Understanding of Terrorism and Extremism? (Cheltenham: Edward Elgar Publishers, 2013), 115, 131, 204 note 21;

Brynjar Lia, Al-Suris Doctrines for Decentralized Jihadi TrainingPart 1, Terrorism Monitor 5, no. 1 (2007), http://www.jamestown.org/single/?no_cache=1&tx_

ttnews[tt_news]=1001.

[12] Harris-Hogan, Australian Neo-Jihadist Terrorism, 298-314.

[13] Supreme Court of New South Wales, R V Elomar & Ors [2010] NSWSC 10, (15 February 2010); Supreme Court of New South Wales, Regina (CWealth) v

Sharrouf [2009] NSWSC 1002, (24 September 2009); Supreme Court of New South Wales, Regina (CWealth) v Touma [2008] NSWSC 1475, (24 October 2008).

[14] Mitchell D. Silber, The Al-Qaeda Factor: Plots Against the West (Philadelphia: University of Pennsylvania Press, 2012), 238-240; Harris-Hogan, Anatomy of a

Terrorist Cell.

[15] Supreme Court of New South Wales, NSWSC 10; Supreme Court of New South Wales, NSWSC 1002; Supreme Court of New South Wales, NSWSC 1475.

[16] Harris-Hogan, The Importance of Family,.

[17] Supreme Court of Victoria Court of Appeal, Benbrika & Ors v The Queen [2010] VSCA 281, (25 October 2010) 14.

[18] Shandon Harris-Hogan and Andrew Zammit, The Unseen Terrorist Connection: Exploring Jihadist Links Between Lebanon and Australia, Terrorism and

Political Violence 26, no. 3 (2014): 449-69.

[19] Supreme Court of New South Wales, NSWSC 10, 21.

[20] Harris-Hogan, Anatomy of a Terrorist Cell.

[21] Supreme Court of Victoria, VSC 21, 1.

[22] Supreme Court of Victoria, Transcript of Proceedings; the Queen V. Abdul Nacer Benbrika Et Al., ed. Victorian Government Reporting Service (Melbourne:

VGRS, 2008), 2295-99.

[23] Ibid., 244, 466-67, 76, 87, 545, 69, 636-37, 3933, 61-62, 85, 4012; Supreme Court of New South Wales, NSWSC 10, 8; Richard Maidment, Personal Interview,

(Melbourne 2012), 5; Nicholas Robinson, Personal Interview, (Melbourne 2012), 6.

[24] Harris-Hogan and Zammit, The Unseen Terrorist Connection, 449-69; Harris-Hogan, Anatomy of a Terrorist Cell.

[25] Supreme Court of New South Wales, NSWSC 1002,; Supreme Court of New South Wales, NSWSC 1475,; Supreme Court of New South Wales, NSWSC 10,

9.

ISSN 2334-3745 97 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

[26] Supreme Court of New South Wales, NSWSC 10, 8-11; Supreme Court of Victoria, Transcript of Proceedings; Director of Public Prosecutions V.

Abdul Nacer Benbrika Et Al., ed. Victorian Government Reporting Service (Melbourne: VGRS, 2011) 21-28, 36-49, 52-53, 84-85, 89-92; Porter and Kebbell,

Radicalization in Australia, 225; Maidment, Personal Interview, 1.

[27] Supreme Court of New South Wales, NSWSC 10; Debra Jopson, Homegrown Jihad, Sydney Morning Herald (4 February 2012).

[28] Supreme Court of New South Wales, NSWSC 10, 8-11; Supreme Court of Victoria, Transcript of Proceedings; Director of Public Prosecutions V. Abdul

Nacer Benbrika Et Al., 21-28, 36-49, 52-53, 84-85, 89-92; Supreme Court of New South Wales, NSWSC 1002, 5; Porter and Kebbell, Radicalization in Australia,

225; Maidment, Personal Interview, 1.

[29] Supreme Court of New South Wales, NSWSC 10, 7.

[30] Ibid., 7-8, 14; Supreme Court of Victoria, Transcript of Proceedings; Director of Public Prosecutions V. Abdul Nacer Benbrika Et Al., 29-30, 33-35, 81-84,

86-87; Maidment, Personal Interview, 2-3.

[31] Supreme Court of Victoria, Transcript of Proceedings; Director of Public Prosecutions V. Abdul Nacer Benbrika Et Al., 45.

[32] Pete Lentini, Grace Under Pressure? Assessing the Impact of Terrorism and Counter-Terrorism Raids on Terrorist Behaviour: A Study Based on Wire Tap and

Electronic Bugging Device Evidence of a Melbourne Jemaah 2004-05, Paper Presented to Terrorism and Counter-Terrorism in Australia and Indonesia: 10 Years

After Bali (ARC Linkage Project on Radicalisation in Australia 2012 Conference, Melbourne, Monash University Law Chambers: 26-28 September 2012).

[33] Supreme Court of Victoria, Transcript of Proceedings; the Queen V. Abdul Nacer Benbrika Et Al., 556-66, 624-25, 35-38, 3932-33, 89-93, 97-98, 4013-22;

Supreme Court of Victoria, VSC 21, 9.

[34] Supreme Court of Victoria, Transcript of Proceedings; the Queen V. Abdul Nacer Benbrika Et Al., 680-81, 96, 702-05, 3861, 64, 946, 4051-55, 80-87;

Maidment, Personal Interview, 4; Robinson, Personal Interview, 7; Pete Lentini, If They Know Who Put the Sugar It Means They Know Everything:

Understanding Terrorist Activity Using Operation Pendennis Wiretap (Listening Device and Telephone Intercept) Transcripts, Paper Presented to Understanding

Terrorism from an Australian Perspective: Radicalisation, De-Radicalisation and Counter Radicalisation (Melbourne, Monash University Caulfield Campus, 2010),

30.

[35] Maidment, Personal Interview, 5; Robinson, Personal Interview, 1-2, 5-6; Supreme Court of Victoria, Transcript of Proceedings; the Queen V. Abdul Nacer

Benbrika Et Al., 209, 390-91, 97, 563-70, 681, 96, 702-03, 1076-77, 868-873, 3804, 32-33, 90-92, 97, 914, 981, 986, 4059; Supreme Court of Victoria, Transcript

of Proceedings; Director of Public Prosecutions V. Abdul Nacer Benbrika Et Al., 29-30, 85-86; Porter and Kebbell, Radicalization in Australia, 222-23; Sally

Neighbour, The Extremist Threat in Australia, Paper Presented to Trusted Information Network on Extremism and Transnational Crime in Southeast Asia and

Australia (Singapore, Marina Mandarin, 2008), 3.

[36] Debra Jopson, Cold Trail: Trying to Find the Missing Rocket Launchers, Sydney Morning Herald (8 February 2012).

[37] Debra Jopson, Launchers On Loose: Still Searching But No Sign of Lost Rockets, Sydney Morning Herald (8 February 2012).

[38] Keith Moor, Why a Jury Will Never Hear About Extremists Plans for Mass Murder in Australia, Herald Sun, 21 September 2011, 2-4; Sally Neighbour,

Sydney Terror Case Guilty Pleas Kept from Jury, The Australian (17 October 2009); Harris-Hogan, Anatomy of a Terrorist Cell, 6.

[39] SIO39 called himself Ahmet Sonmez when among the suspects and was also known by his nickname The Turk.

[40] Supreme Court of Victoria, Transcript of Proceedings; the Queen V. Abdul Nacer Benbrika Et Al., 2295-99.

[41] Ibid., 395-97, 2317-19, 22-25, 3881, 903.

[42] Supreme Court of Victoria, Transcript of Proceedings; the Queen V. Abdul Nacer Benbrika Et Al., 241-42, 380, 95-97, 410-12, 2286-91, 328-329, 3921.

[43] Ibid., 396, 400, 10-11, 14-17, 83, 2286-91, 332-333, 3901-02, 25, 29, 52-53; Pete Lentini, If They Know Who Put the Sugar It Means They Know Everything:

Understanding Terrorist Activity Using Operation Pendennis Wiretap (Listening Device and Telephone Intercept) Transcripts, in Understanding terrorism from

an Australian perspective: radicalisation, de-radicalisation and counter radicalisation (Monash University, Melbourne: Global Terrorism Research Centre, Monash

University, 2010), 24-26.

[44] Supreme Court of Victoria, VSC 21, 10.

[45] Supreme Court of Victoria, Transcript of Proceedings; the Queen V. Abdul Nacer Benbrika Et Al., 414-15, 3858; Supreme Court of Victoria, VSC 21, 20-21,

31-32.

ISSN 2334-3745 98 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

[46] Supreme Court of Victoria, Transcript of Proceedings; the Queen V. Abdul Nacer Benbrika Et Al., 366-73, 80-81, 89, 529-32, 60, 3854, 58-62, 64-65; Lentini,

If They Know Who Put the Sugar It Means They Know Everything, 13.

[47] Supreme Court of Victoria, Transcript of Proceedings; Director of Public Prosecutions V. Abdul Nacer Benbrika Et Al., 51, 72; Supreme Court of Victoria,

Transcript of Proceedings; the Queen V. Abdul Nacer Benbrika Et Al., 384, 87, 90-91, 410-14, 17, 3894-95, 908-909, 912-916, 920; Maidment, Personal Interview,

4.

[48] Supreme Court of Victoria, Transcript of Proceedings; Director of Public Prosecutions V. Abdul Nacer Benbrika Et Al., 26-50.

[49] Supreme Court of Victoria, Transcript of Proceedings; the Queen V. Abdul Nacer Benbrika Et Al., 414, 645, 53-61, 84, 711, 4059; Harris-Hogan, Australian

Neo-Jihadist Terrorism, 298-314; Lentini, If They Know Who Put the Sugar It Means They Know Everything; Lentini, Grace Under Pressure.

[50] Supreme Court of New South Wales, NSWSC 10, 11-13.

[51] Ibid., 11.

[52] Supreme Court of Victoria, Transcript of Proceedings; Director of Public Prosecutions V. Abdul Nacer Benbrika Et Al., 26-31, 34-35, 39, 43, 46-51, 78, 84,

87-88; Supreme Court of New South Wales, NSWSC 10, 11.

[53] Supreme Court of Victoria, Transcript of Proceedings; Director of Public Prosecutions V. Abdul Nacer Benbrika Et Al., 50-51, 58, 86-87, 89, 93-96; Supreme

Court of New South Wales, NSWSC 10, 11, 20-21; Maidment, Personal Interview, 2-3.

[54] Supreme Court of Victoria, Transcript of Proceedings; Director of Public Prosecutions V. Abdul Nacer Benbrika Et Al., 97; Harris-Hogan, Anatomy of a

Terrorist Cell, 8-9.

ISSN 2334-3745 99 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Who Are They and Why Do They Go?


The Radicalisation and Preparatory Processes of Dutch Jihadist Foreign
Fighters
by Daan Weggemans, Edwin Bakker and Peter Grol

Abstract
How do European Muslim men and women become involved in a violent jihadist struggle abroad? After the
sharp increase in the number of European jihadist foreign fighters in Syria since 2012, this has become a
pressing question for both academics and policymakers. Concrete empirical examples of radicalisation processes
and preparations for engaging in the violent jihad in Syria can help to increase our understanding of these
processes. In this article we will discuss the main elements of five Dutch jihadist foreign fighters radicalisation
and preparatory acts. This information is derived from interviews with persons who had been in the direct
environment of these jihadists during their radicalisation phase and the time they were preparing their travel
to Syria. The findings are brought together and presented in the form of two composite stories of fictional Dutch
foreign fightersDaan and Drissthat can be regarded as typical for a number of other Dutch cases.

Keywords: the Netherlands, Syria, foreign fighters, jihadism

Introduction
The phenomenon of European foreign fighters is not a new one.[1] There are many examples of groups and
individuals that, for a variety of motives and from various ideological backgrounds, have joined an armed
struggle abroad. The phenomenon of jihadist foreign fighters is not new either. In the past two decades,
European Muslims took part in the civil war in Bosnia or went to fight in Afghanistan, Iraq, Somalia and
other parts of the wider Islamic world. In the case of Syria, the phenomenon of foreign fighters emerged after
the nonviolent protests in March 2011 turned from riots into a full-blown civil war in the summer of 2011. At
an early stage, the conflict drew fighters from other parts of the world, including persons from EU member
states such as the Netherlands.

The presence of jihadist foreign fighters in general and that of European foreign fighters in particular has
raised worries in many of the countries where these people originate from. Authorities in Europe fear that
individuals who participate in the fight in Syria may become further radicalised, become trained in the use
of weapons and explosives, and then return to Europe as part of a global jihadist movement.[2]Moreover,
with the ever rising numbers of foreign fighters in Syria who may some day return, European countries
are heading for a serious security problem as most countries do not have the capacity to track or pursue all
possible returnees.

As a consequence, in many European countries a strong emphasis has been placed on the prevention of
potential jihadists leaving for Syria. However, the legal tools to do so are limited. In addition, it is not
always clear what to look for and what to do if there are signs of radicalisation or preparation for travel to
Syria. It requires a great deal of capacity and experience, and the necessary manpower, as well as excellent
coordination and cooperation between authorities and other relevant stakeholders to at least have a chance to
stop potential jihadists from departing via Turkey to Syria. One of the main obstacles for early detection and
intervention is a lack of knowledge among front line social workers and police officers about radicalisation
and the foreign fighter phenomenon. In addition, limited experience with, and available means for

ISSN 2334-3745 100 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

countering radicalisation can lead to a situation in which signals are observed but are not linkedto the jihad
in Syria. Moreover, individual signs of radicalisation and preparation often do not provide a complete picture
of the situation. Yet even when different pieces of the puzzle are combined, their interpretation often remains
difficult. Something is going on, but what? It remains unclear what exactly friends and family members or
the authorities need to worry about. Many young people change their behaviour and attitudes during teenage
years or in their early twenties, but what developments point in the direction of radicalisation and finally to
heading for Syria?

Concrete empirical examples of radicalisation processes and preparations for engaging in a violent jihad can
increase the awareness and understanding of these processes amongpotential first line responders (teachers,
social workers, community police officers) and parents, friends or acquaintances of potential jihadists. From
a more academic perspective these empirical examples are essential for gaining a thorough understanding of
a process like radicalisation.[3] This brings us to an apparently fundamental problem of (counter-)terrorism
and radicalisation studies.[4] Silke and Sageman, for instance, have stressed that although the number of
publications in this field has expanded rapidly since 9/11, only a small percentage of them presents new
empirical information and digs deep enough.[5]A substantial part of the literature on terrorism consists of
literature reviews and conceptual work.[6] Notwithstanding the inherently complicated nature of obtaining
primary-sources based data, this poses a significant obstacle for moving terrorism research forward.[7]

Against this backdrop, the authors conducted an exploratory study that aims to contribute to our
understanding of jihadist foreign fighters from the Netherlands by presenting the biographies or life stories
of five Dutch jihadist foreign fighters who went to Syria.[8]The data for this Research Note were collected
through interviews with eighteen persons who had been in the direct environment of five Dutch jihadists
during their radicalisation phase[9] and during the time they were preparing[10] their travel to Syria. The
five life biographies were translated into two condensed life stories that contain the key observations
regarding the radicalisation period and the preparation phase. Using a focus-group discussion with twenty-
five experts (frontline professionals and policymakers) who deal with radicalisation and (returning) foreign
fighters, we compared these key observations with their experience in working with these youngsters or the
stories they had been told by the friends and families of foreign fighters originating from the Netherlands.
Thus we attempted to address the following two questions: a) what does the radicalisation process of a foreign
fighter in the Netherlands look like and b) what do their preparations for travelling to Syria look like?

In the remainder of this Research Note we will first give a general introduction to the problem of jihadist
foreign fighters from the Netherlands on the basis of the publications of the General Security and Intelligence
Services (AIVD) and the National Coordinator for Security and Counterterrorism (NCTV) who were the
first to report on this phenomenon.Subsequently our research approach and methodology will be discussed
before presenting the two condensed life stories thatsynthesise crucial elements of the biographies of the
five researched Dutch jihadist foreign fighters.In the conclusion we will reflect upon the key elements of
these life stories.

Jihadist Foreign Fighters from the Netherlands


In December 2012 and the first months of 2013, Dutch authorities observed a rapidly growing number of
Dutch citizens and residents going to Syria to join the fight against the regime of Bashar al-Assad on the side
of jihadist groups.Initially, the authorities were taken by surprise by the flow of persons from the Netherlands
that participated in the jihad in Syria. For years, the terrorism threat level in the Netherlands (Dreigingsbeeld
Terrorisme Nederland; DTN) had been limited. However, the DTN report of December 2012 remarked that

ISSN 2334-3745 101 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

the conflict in Syria was becoming a new jihadist magnet [] drawing jihadists from the Arab world but
also from Europe.[11]

In January 2013, the AIVD decided to bring this potentially threatening new development to the attention
of the general public. In an interview on television, the head of theAIVD stated that many of the foreign
fighters jointhe jihadist group Jabath al-Nusra (JaN).[12] A few months later, the countrys official threat
level was raised to substantial, the second highest. One of the reasons was the significant increase in the
number of jihadists travelling to countries in Africa and the Middle East, especially Syria.[13]In April, the
AIVD explained why the phenomenon of travelling jihadists was a source of concern to the Netherlands.
According to its Annual Report 2012,when abroad, these jihadists acquire combat and other skills and
contacts, and may also return in a traumatised condition.[14]It noted a large increase in the number of
jihadists travelling to Syria at the end of 2012, pointing at the extensive media and internet attention for the
conflict in Syria, and the easy accessibility of the country.[15]

The first wave of jihadist travellers to Syria was composed of members of activist radical Islamist movements,
such as Behind Bars and Shariah4Holland.[16]During 2012 thedividing line between radicalism and
jihadism was blurred as these movements created an environment living room meetings, outdoors events,
websites, etc. in which radical ideas developed into jihadist views. This resulted in the rapid radicalisation
of many individuals and a rise in actual attempts to participate in the jihad in Syria.[17]Today, many of
the members of these and other activist radical Islamist groups have gone to Syria or constitute the core
of a scene that is still fervently promoting the jihad in Syria, either on the streets of Dutch cities or on the
Internet.Quite openly, they express support for, and display loyalty to groups like the Islamic State in Iraq
and the Levant (ISIL) and the earlier mentioned Jabhat al-Nusra.[18]

Today, the terrorism threat level in the Netherlands continues to be substantial given the on-going threat
posed by the above mentioned groups and the increasing number of those returning from Syria. In February
2014, theNational Coordinator for Security and Counterterrorism (NCTV) spoke of more than twenty
returnees.[19]In April, this number had grown to about thirty.[20]These returnees are part of a group
of more than one hundred Dutch citizens and residents who have travelled to Syria. The assessments of
May 2014 speak of more than seventypersons that are in Syria, at least ten who have died there, and of
about thirty returnees.[21]In 2014, the fight in Syria also seemed to have attracted new groups of potential
foreign fighters, including an increasing number of women.[22] Against this background it is obvious that
there is no standard Dutch foreign jihad fighter. However, although there is no clear profile of these foreign
fighters, there are a number of general observations that can be made based upon what is communicated by
Dutch intelligence and security services. The group of Dutch foreign fighters is comprised of mainly male
youngsters, and persons with various ethnic and socioeconomic backgrounds. Moreover, according to the
AIVD, the average age of those who travel to Syria is decreasing.[23] The majority of the Dutch foreign
fighters has a jihadist agenda and has joined either ISIL or JaN.[24]All of these individuals have been active
in jihadist circles for various lengths of time, in the virtual or real world.[25]The fact that most Dutch foreign
fighters have joined jihadist groups is one of the main reasons why the authorities are worried and the threat
level has remained substantial.

According to the AIVD several fighters have returned to the Netherlands, frequently bearing alarming
baggage: they are trained, traumatized or radicalised even further.[26]To limit the potential threat, the
authorities aim to contain the flow of persons travelling to Syria and are further developing a strategy to deal
with those returning. Policies related to returnees range from soft assistance programs by local authorities
to hard criminal investigations and persecution efforts by the public prosecutors office. The various security
partners involved are asked to remain alert to radicalisation and possible signs of preparation for travelling to

ISSN 2334-3745 102 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Syria.[27]

To that end, the NCTV provides advice to practitioners and promotes the development of expertise, for
instance by offering or supporting security awareness training. However, this is easier said than done. As
mentioned earlier, recognising the radicalisation process and the preparation phase of those that want to
join the jihad in Syria is very difficult. For instance, this process can sometimes be very short.[28] There are
several cases of youngsters who, seemingly out of the blue, became foreign fighters within a few weeks or
months. Even many parents were taken by surprise, let alone teachers, social workers, community police
officers and local authorities who make up the second ring of possible observers of changes in attitudes and
behaviour among these youngsters.[29] Sometimes certain signals were observed, but did not provide a
clear and complete picture, as a result of which follow-up actions were postponed.[30] Even when different
signals are brought together it is still difficult to make a proper assessment as there is limited material to
compare with. Some signals about changes in attitudes and behaviour provide reasons to worry, but to worry
about what? Youngsters at the age of most of the foreign fighters show all kinds of changes in attitude and
behaviour, but which ones indicate a process that leads to becoming a foreign fighter? To answer these highly
relevant questions, we need more empirical research. We need more concrete examples that can help to give
an overview of the puzzle in order to a) recognise signals or information, and b) to put the pieces of the
puzzle together and assess the situation.

Research Approach and Methodology


This Research Note aims at getting a better picture of Dutch jihadist foreign fighters. With this explorative
study we hope to gain some preliminary insights on this phenomenon by reconstructing the radicalisation
and preparation processes of a small number of Dutch jihadist foreign fighters who left for Syria. We studied
the life stories of five young men who participated in the struggle against the Assad regime between summer
2012 and fall 2013. In this article we will present two abstracted stories consisting of the main elements of
these five cases.

The five cases were selected, to the extent information was available, in such a way as to represent the larger
population of at least one hundred Dutch jihadist foreign fighters in terms of age, ethnic background,
percentage of converts to Islam, social economic background and region of residence. However, accessibility
of sources, especially access to persons who were close to our research subjects during their radicalisation
phase and the preparation for leaving for Syria, proved to be an important factor for our case selection as
well. It was, as expected, not easy to find respondents who agreed to an interview. Feelings of shame and
sorrow or fear that talking with researchers would lead to repercussions, such as intimidation by members of
the Dutch jihadist scene or trouble with the authorities, formed important obstacles. These obstacles proved
bigger in relation to persons of Moroccan descent than in relation to Dutch converts. As a result, the share of
converts fromethnically Dutch families, two out of five, is inflated.

For each case three to seven people were interviewed (a total of eighteen respondents of whom seven
were interviewed regarding multiple cases) between November 2013 and April 2014. The semi-structured
interviews were based on a set of topics to be discussed in depth.[31] These topics were related to the
following categories: questions about character or personality, family situation, social network, meaning of
life and religion, political ideas, personal experiences. We asked our respondents to focus on the following
time periods in the life of the foreign fighters: childhood, adolescence, adult life (if applicable), year before
going to Syria and last weeks before travel.

All interviews were conducted in a face-to-face setting. The interviewees included friends and family

ISSN 2334-3745 103 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

members as well as employers, social workers and local police officers and persons connected to mosques.
The respondents were in the direct environment of our research subjects during their radicalisation and while
engaging in preparatory acts for leaving for Syria. We argue that this makes them valuable respondents for
our study as they possess important, first-hand, knowledge on how these processes unfolded and because
they are able to reflect upon potential (missed) signals of a forthcoming departure.[32]

The interviews were supplemented, when available, with open source information on the five cases. This
resulted in five biographies of Dutch jihadist foreign fighters that describe their lives before leaving for
Syria and the subjective interpretations of their radicalisation and preparation phase by the interviewees.
Considering the sensitivity of the matter at hand, all personal data in the five life stories has been anonymized
(different names and places have been used as well as hobbies and other personal characteristics have been
feigned). This, however, has no consequences for the scope and meaning of these biographies. We named the
persons Erik, Tarik, Faysal, Elmir and Steven.

Erik and Steven are two boys who were raised in ethnically Dutch families and converted to Islam after
finishingtheir high school education.Tarik and Elmir on the other hand were raised in immigrant families.
Tarik was raised in atraditional and religious Turkishfamily while Elmirs family isfrom the West Indies and
converted to Islamwhen he was 18 years old. Faysal was born to a Iraqi-Kurdish father and a Dutch mother
and converted to Islam during his last years of high school.

The life stories of these five individuals encompass different elements of the development towards becoming
a foreign fighter in Syria; personal, ideological, political and social.The elements that were most often
encountered in the interviews or in open source information on the five cases were extracted from these five
biographies and comprised into the fictive life stories of Daan and Driss. Due to the limited length of this
Research Note,we opted for this type of presentation, instead of, for instance, producing a list of observations
or possible relevant factors or indicators, as it gives more opportunity to highlight the complexity and the
importance of context with regard to the radicalisation and preparation phases of the Dutch foreign fighters.
[33] This presentation also corresponds with the explorative nature of this study. Moreover, using compressed
stories allows for comparing these cases with the experiences of practitioners and experts in the field in focus
group meetings (see below). In the end, all radicalisation processes are to a certain extent idiosyncratic. It is
therefore impossible to speak of a single typical radicalisation pathway. However, some elements or themes
stood out in the cases we looked into. By combining the recurrent elements and themes from multiple
cases into two condensed stories, we aim to provide a grounded insight into these recurring elements of the
radicalisation processes whilst acknowledging their inherent complexity.

We opted for two composite stories to be able to present and discuss a number of key contrasts or
dissimilarities that recurred in the five researched cases: uncertain/self-confident behaviour, follower/leader
types, of Moroccan background/of other ethnic background, and of Muslim background/convert. These
contrasts or differences are partly interrelated and can be translated into two stories that reflect recurring or
typical elements of the cases we studied. The story of Daan shows the development of a somewhat uncertain
teenager who converted to Islam. He could be described as a follower. Driss story is one about a popular,
rather self-confident young man of Moroccan background with many friends in his neighbourhood. He
is more a leader-like type. The key elements that constitute the basis of the life stories of Daan and Driss
include, amongst others, traumatic experiences in (family) life, difficulties at school or work, confrontations
with charismatic persons, personal disappointments, trouble with the authorities, a change of home address,
developments at school, (new) friendships, and an increased interest in religion.

In a workshop with a focus group panel of twenty-five professionals (frontline workers, representatives of

ISSN 2334-3745 104 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

local NGOs, community police officers and local policymakers who deal with the issue of radicalisation
and foreign fighters) we presented the two condensed life stories. In that version, we underlined the most
recurring and most typical elements in the biographies ofDaanand Driss. In group discussions, we
compared these key observations with their experiences in dealing with radicalisation and returning foreign
fighters. There appeared to be very much overlap between the outcome of our earlier interviews and their
translation into the life stories of Daan and Driss and what the members of our focus group had been
confronted with. In fact, they regarded both stories as rather typical for the cases they had been confronted
with. Based on the input from the focus group we only altered the wordings of some of the key observations
in the stories of Daan and Driss. They related to traumatic experiences in life, such as the death of a close
family member and not knowing what to do with ones life. In this way we designed the two composite life
stories presented below.

Composite Life Story # 1: Daan


Daan grew up in a middle-sized town in the west of the country in a family of four; father mother and
an older brother. The neighbourhood in which they lived had a bad reputation because ofproblems with
youngstersfrom a variety of ethnic and religious backgrounds. Unlike most other kids in the neighbourhood,
Daan started the second highest level of secondary educationand initially managed without any problems to
progress in class from year to year. Both in the neighbourhood and at school he was a bit ofan outsider. He
found it difficult to connect to other children who regarded him as a bit weird; always reading and studying
instead of playing sports, playing on the streets and crossing the line into criminal activities every once in a
while. He was known as a silent goody-goody. When Daan was sixteen, his family was confronted with avery
serious illness of his father. For a long time, Daan was not told about the seriousness of the disease; talking
about it was taboo. At school, his grades went down and he started missing classes. His mother did not really
know his whereabouts at this time. We were so preoccupied with the disease of his father that I hardly knew
where Daan was in the months before his dad died.

Around that time, Daan increasingly began to hang around with two brothers of Iraqi descent that lived in
the same neighbourhood. These boys were slightly older than Daan and had been in contact with the police
(as a Dutch euphemism goes), but subsequently had found structure and meaningin life through Islam. They
took Daan to a mosque in another part of town. A few weeks after the death of his father, he converted to
Islam. He kept it hidden for a while from his brother and mother. She was very surprised when she saw her
son among other boys dressed in a traditionaldjellaba.[34] She wasinitially pleasedwhen Daan explained to
her why he had converted, that he had found brotherhood and that it helped him to deal with the death of his
father. This feeling of relief quickly passed away when he suddenly started calling everythingharam [35]at
home and did not want to join them for dinner when the food was nothalal.[36] Especially Daans brother,
Robert, took offense from this behaviour. This led toquarrels that occasionally became very heated. After a
particularly fierce argument Daan suddenly grabbed a bag and he was gone, said the mother. I regret I did
not report him as missing... but he was 17 and I thought he will simply come home afterfew days.

The mother was somewhat reassured the next day, when Daan sent a loving text message in which he said
he was sorry and that hewas staying with friends. After that, he came home only occasionally to pick up
some stuff and to chat with his mother. She noticed that he often talked about politics and how wonderfully
Islamprotected weaker members of society. She found it hard to talk to him about such matters. Around that
time, Daan stopped having contact with the few friends he had at high school, despite the fact that he went
to school regularly again and even started having quite good grades. From then on, he becameeven more an
outcast at school: the silent convert without any friends.

ISSN 2334-3745 105 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

He did have friends outside school. According to a community police officer from another part of the city,
Daan was a member of a group of radical Muslims who often came together totalk about religion and
politics. This particular group was banned from several mosques after confrontations with other visitors.
Youth workers knew several of them from the time they were younger and were causing many problems.
According to the imam of a mosque where they were no longer welcome, [t]hey intimidate our mosque
attendantsand feel that they alone represent the true Islam. I dont know. The misery in Syria hurts us all,
but their hatred against Shiites and the West is way over the top.I am so worried about this. The community
police officer was aware of these concerns, but because the confrontations at the mosque had stopped, it
wasfelt that no further actionswere necessary. A rumour that two brothers from the radical group were
fighting in Syria was seen as little more than bragging. Two days later, after theirdesperate parentshad
reported them missing, it was clear that they indeed had left for Syriatogether with Daan.

Composite Life Story #2: Driss


Driss grew up on the streets of a large city in the Netherlands. As the third child in a family of eight his
playroom was outdoors, especially the soccer field behind the flats of thebad neighbourhoodin which they
lived. Like most of his neighbours, he was of Moroccan descent. He had a hard time at school. His language
deficiency his mother could hardly speak any Dutch he managed to overcome. During his high school
years (at the lowest secondary education level)he was alocally well-known rapperwhoincorporated alleged
discrimination against young immigrants into hissharptexts. This made himpopularat school and in his
neighbourhood. His Dutch teacher had always hoped Driss could have become a role model as a successful
rapper. He was also generally regarded as a sympathetic and cheerful boy. He had once beencaught
during a burglary, but otherwise stood out positively among the rest of his friends and other kids in the
neighbourhood. Unlike most of his friends he had a job as a general assistant in a supermarket. However,
he lost this job when it appeared that he had been an accomplice of a robbery at the same store by opening
a backdoor at about closing time to let in his criminal friends. As a consequence, he came into contact with
the law, but eventually was sentenced only to community service. During this difficult period, he managed to
finish high school. After that, he enrolled in an upper level vocational training program Trade & Enterprise
in a nearby town.After the first weeks he hardly showed up in class. He also seemed to have given up on
rapping.

At that time, he made an exasperated and restless impression, according to a social worker from his
neighbourhood. He did not manage to deal with that thing with the robbery and the transition to a new
school in a new town. Also his group of friends gradually fell apart.Some went to other schools, some had
problems with the law and Drissdid not seem to know what he should do with his life.

A part of the group of friends that continued to hang around in the neighbourhood started to get an interest
in religion after the arrival of acharismatic figurein a mosque in an adjacent part of town. Initially Driss met
them only occasionally. When the discussion was becoming more political in nature, however, Driss interest
was aroused. With the same verve as from the time he was rapping, heemerged as agifted speaker at the
living-room meetings and on public squares in the neighbourhood. They performed dawah[37] and went up
to youngsters who caused trouble to say something about their behaviour, said a community police officer.
Driss stood out from the rest because he did not change his dress. He flourished again and that positive
attitude of his attracted a lot of other people. Because of him, I then too started to study Islam for a while,
said one of his neighbours. Driss became one of the key figures ofan activist Islamist group. He and his fellow
activists also went to demonstrate a number of times in The Hague against the burqa ban. By that time he had
grown a thin beard.

ISSN 2334-3745 106 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

When it was known that three members of the group had travelled to Syria, his parents were informed about
this by acquaintances. They knew about the radical ideas of their son, but were not particularly negative
or worried about it, though they did not like him being involved in demonstrations. Moreover,at home he
hardly talked about politics or religion. In fact they were glad that Driss was interested and positive about
something again. His father remembered that Driss told them he wanted to continue his studies and that he
had a job at an Islamic butchers shop. When we heard that some of his friends had gone to Syria, we were
shocked at first, but when Driss told about all his plans, we were just very relieved. To us this was proof
thathe would not go to Syria and that his future was here. The parents were very upset andbitterwhen they
learned two weeks later that Driss was in fact in Syria. Why did the secret police not warn us and stop him!
Why had they not arrested him at that demonstration!

Conclusion
In this Research Note we looked into concrete cases of Dutch jihadist foreign fighters. We argued that more
empirical data is needed to gain a better understanding their motivations. Based on interviews with eighteen
individuals who were in the direct environment of five persons who had joined the struggle against the
regime of Bashar al-Assad and supplemented with other available open source materials we reconstructed
their life stories. Next we translated these five biographies in two condensed life stories. These were
compared with the experience of a focus-group of more than twenty experts in the field of radicalisation
and foreign fighters and their observations and experiences were incorporated. The final versions of these
two condensed life stories aim to address isues related to the radicalisation process of a foreign fighter in the
Netherlands and his preparation before traveling to Syria.

Before we reiterate the key observations of our exploratory study, we would like to remind the reader that the
two condensed life stories cannot possibly provide a complete picture of the phenomenon of Dutch jihadist
foreign fighters and their radicalisation process and preparation phase. Here as elsewhere, radicalisation is
foremost characterised by complexity and dissimilarity.[38] It goes without saying that the small number of
cases that were studied prohibits us from drawing any general conclusions. The study limits itself to providing
a set of often recurring elements in the life stories of five foreign fighters and a few preliminary assumptions
that need further testing. Keeping this in mind, we present the following key observations of our study:

Based on the publications of the AIVD and the NCTV it would appear that the Syrian conflict
has attracted jihadist fighters from different ethnic backgrounds and from various parts of the
Netherlands. The AIVD also stressed the virtual glorification of Dutch jihadist foreign fighters
and regards this as one of the causes for the rise in jihadists traveling to Syria. However, during
our interviews and from the expert panel we consulted, it did not emerge that the internet played
a decisive role in the radicalisation of our research subjects and their decision to leave for Syria.
Although some of them visited radical websites, this was not regarded by our interviewees as a very
important reason for their radicalisation.

Based on our interviews and the workshop with the expert panel, the group of Dutch foreign fighters
consists mostly of individuals under the age of 25, with middle and low education levels, originating
from lower or lower middle class socio-economic backgrounds. They were raised in relatively bad
neighbourhoods in both traditional religious immigrant and Islamic families as well as in ethnically
Dutch families.

Some interviewees observed strong frustrations among our five research subjects in the years before
they left about their own societal position in the Netherlands or that of their ethnic groups. Only in

ISSN 2334-3745 107 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

some cases were frustration and concerns expressed about the Syrian conflict.

We found in our sample that some of our research subjects had been exposed to traumatic
experiences, such as the loss of a loved one or experiencing difficulties at school or work and trouble
with the authorities, in the period before joining a violent jihadist group in Syria.

During the radicalisation and preparatory processes, our research subjects increasingly isolated
themselves from society. This manifested itself in two ways: the radicalising individual cuts the ties
with his former social environment (for instance with old friends or family members) or the social
environment expels the radicalising individual (for instance when individuals or groups are being
banned from mosques).

In the researched cases individuals were confronted with, and shared their radical ideologies or ideas
about, Syria via radical networks. Sometimes these networks consisted of old friends (often from the
same neighbourhood) who had radicalised collectively. In other cases, a change of home address or
school brought them in contact with new friends who belonged to radical groups or they encountered
charismatic persons. In our cases, these charismatic persons were not religious authorities or former
jihadi foreign fighters. Their role can be the articulating and disseminating of a radical agenda or
the sharing of specific knowledge about how to become involved in the Syrian jihad. In addition, in
most cases, other persons within the social networks of the five studied foreign jihadist fighters had
preceded them in joining Syrian jihadist groups.

Among our research subjects we found feelings of apathy and lack of meaningfulness in their lives
in the period before they left for Syria. In these cases participating in the Syrian conflict seemed to
provide them with a sense of purpose and fulfil their need to belong.

The five persons studied showed an increased interest in religion in the period before they left for
Syria. This manifested itself in visiting (different) mosques, changing eating habits, entering into
religious debates, and visiting certain websites or online forums.

Almost everyone near the individuals who radicalised and prepared for travelling to Syria, were
caught by surprise when they found out that these individuals had actually left. Political statements
of those who left for Syria were often escaping their attention since these were not made at home or
in public. Preparatory acts were concealed from family members, who, in a number of cases, were
deceived.
Our key observations and preliminary assumptions show a complex and diverse picture of the Dutch Muslim
foreign fighters and their radicalisation process and preparation phase. Much more empirical research is
needed to be able to arrive at a set of well-defined factors, circumstances or dynamics that will help us to
understand this phenomenon. With the two condensed life stories we hoped to provide some empirical
insights that can be used by other scholars who study the phenomenon of foreign fighters as a means of
comparison and validation.

About the authors: Daan Weggemans (MSc, Nijmegen University) is a researcher at the Centre for Terrorism
and Counterterrorism (CTC) at Leiden Universitys Campus The Hague in The Netherlands. Edwin Bakker
(PhD, University of Groningen) is Professor of (counter) terrorism studies, director of the CTC and Fellow of the
International Centre for Counter-Terrorism (ICCT) in The Hague. Peter Grol (MA, Leiden University) is an
independent researcher.

ISSN 2334-3745 108 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Notes
[1] Edwin Bakker, Christophe Paulussen and Eva Entenmann, Dealing with European Foreign Fighters in Syria: Governance Challenges & Legal Implications,

ICCT Research Paper (International Centre for Counter-terrorism The Hague, 2014); Thomas Hegghammer, The Rise of Muslim Foreign Fighters: Islam and the

Globalization of Jihad, International Security, vol. 35, no. 3 (2011): 5394; Barak Mendelsohn, Foreign FightersRecent Trends, Orbis, vol.55 no.2 (2011): 189-202.

[2] See for instance: Algemene Inlichtingen- en Veiligheidsdienst (AIVD), Annual Report 2013, (AIVD, 2013); National Coordinator for Security and

Counterterrorism (NCTV), Dreigingsbeeld Terrorisme 35, (NCTV 2013); EUROPOL, TE-SAT 2013: EU Terrorism Situation and Trend Report, (EUROPOL

2014).

[3] Bart Schuurman and Quirine Eijkman, MovingTerrorism Research Forward: The Crucial Role of Primary Sources, ICCT Background Note (International

Centre for Counter-Terrorism, 2013): 1.

[4] As Alex Schmid and Albert Jongman stated already in 1988: There are probably few areas in the social science literature in which so much is written on the

basis of so little research. Alex Schmid, Albert Jongman, Political Terrorism: A New Guide to Actors, Concepts, Data Bases, Theories, and Literature (New Brunswick:

Transaction Books, 1988), 179.

[5] Andrew Silke, The Devil You Know: Continuing Problems with Research on Terrorism,Terrorism and Political Violencevol.13, no. 4 (2011): 5; Andrew

Silke, Contemporary Terrorism Studies: Issues in Research, in Richard Jackson, Marie Breen Smyth and Jeroen Gunning (eds.), Critical Terrorism Studies: A

New Research Agenda (New York / London: Routledge, 2009), 34-48; Marc Sageman, The Stagnation of Terrorism Research, Terrorism and Political Violence

(Forthcoming 2013): 1-16.

[6] Neumann and Kleinmann showed that secondary academic literature remains the single largest source of evidence in radicalisation studies and the overall

balance between [the use of] primary and secondary sources (54 percent versus 45 percent) demonstrates that researchers () [in this field strongly rely] on

secondary sources for making their arguments. Peter Neumann and Scott Kleinmann, How Rigorous Is Radicalization Research?, Democracy and Security, vol. 9,

no. 4 (2013): 372.

[7] Schuurman and Eijkman, Moving Terrorism Research Forward.

[8] We define thesejihadist foreign fighters as those who regard it their duty to participate in what they believe to be a jihad of the sword against the regime of

Syrian President Bashar al-Assad and its Shiite allies, and who join local or foreign groups with a jihadist political agenda. The term jihad refers to the so-called

violent or lesser jihad. A person who engages in this type of jihad is called a jihadist. Their actions are claimed to be in furtherance of the goals of Islam. These goals

may include the establishment of a (pan) Islamic theocracy and their restoration of the caliphate. See: Edwin Bakker, Characteristics of Jihadi Terrorists in Europe

(2001-2009), in Rik Coolsaet (ed.), Jihadi Terrorism and the Radicalisation Challenge: European and American Experiences (Farnham: Ashgate Publishing Limited,

2011), 2.

[9] We adopt Neumann and Rogers definition of radicalisation as the changesin attitude that lead towards sanctioning and, ultimately, theinvolvement in the use

of violence for a political aim. See: Peter R. Neumann and Brooke Rogers, Recruitment and Mobilisation for the Islamist Militant Movement in Europe, (Kings

College London, 2007), 11.

[10] In this paper we define preparatory acts as the initial acts of a person who has conceived the idea of leaving for Syria to join the violent jihad. Examples of

preparatory acts include raising money for travel expenses, gaining knowledge on the best way to enter Syria or how to join a specific jihadist group, obtaining

military equipment, announcing the intent to leave or saying goodbye to loved ones.

[11] National Coordinator for Security and Counterterrorism (NCTV), Summary DTN 31, (NCTV, 2012). See: english.nctv.nl/Images/summary-dtn-31_tcm92-

476955.pdf?cp=92&cs=65038.

[12] Bertolee, R. (2013),AIVD waarschuwt voor jihadgangers. Nieuwsuur 07-02-2013.

[13] National Coordinator for Security and Counterterrorism (NCTV), Dreigingsbeeld Terrorisme 32, (NCTV, 2013).

[14] AIVD, Annual Report 2012, 21.

[15] Ibid.

[16] Ibid.

[17] Algemene Inlichtingen- en Veiligheidsdienst (AIVD), Annual Report 2012, (2013), 21.

ISSN 2334-3745 109 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

[18] AIVD, Annual Report 2013, 11; NCTV, Dreigingsbeeld Terrorisme 35.

[19] Ibid.

[20] Ronald Plasterk, Press conference presentation AIVD annual report, (The Hague, 23 April 2014).

[21] AIVD, Annual Report 2013, 9; Plasterk, Press conference.

[22] AIVD, Annual Report 2013, 3.

[23] Ibid., 3.

[24] Ibid., 9.

[25] NCTV, Dreigingsbeeld Terrorisme 35.

[26] AIVD, Annual Report 2013, 3.

[27] NCTV, Dreigingsbeeld Terrorisme 35; Interviews with local policy makers and NCTV officials (March 2013 June 2014).

[28] Interviews with local policy makers and NCTV officials (March 2013June 2014).

[29] Ibid.

[30] Ibid.

[31] Our semi-structured interviews consisted of multiple topics that related to our five cases on which the respondent was asked to reflect upon. Per answer the

interviewer could ask for an elaboration (a probe). This kind of qualitative interviewing offers researchers the opportunity to ask respondents about underlying

motivations, thoughts and ideas and collect detailed information.

[32] It is important to stress that the perceptions of respondents on the course of events may differ. Therefore multiple sources were used to describe the

radicalisation process and preparatory acts of our research subjects. Moreover, there is the risk of subjectivity and the problem of asking all kinds of questions in

hindsight about processes and phases these persons might have wanted to prevent.

[33] The five initial cases can be requested from the authors.

[34] Berber traditional long robe.

[35] Arabic term meaning sinful.

[36] Permissible according to Islam.

[37] Proselytizing or preachingofIslam.

[38] See also Alex Schmid, Radicalisation, De-radicalsiation Counter-radicalisation: A Conceptual Discussion and Literature Review, ICCT Research Paper,

(International Centre for Counter-terrorism The Hague, 2013); Coolsaet, Jihadi Terrorism and the Radicalisation Challenge.

ISSN 2334-3745 110 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

III. Resources

Bibliography on Islamist Narratives and Western Counter-Narratives (Part 1)


Compiled and selected by Judith Tinnes

[Bibliographic Series of Perspectives on TerrorismBSPT-JT-2014-4]

Abstract
This bibliography contains journal articles, book chapters, books, edited volumes, theses, grey literature,
bibliographies and other resources on narratives employed by terrorists and their opponents. It mainly focuses
on Islamist terrorism. While more recent publications have been prioritised during the selection process, the
bibliography is not restricted to a particular time period and covers publications up to mid-July, 2014. The
literature has been retrieved by manually browsing more than 200 core and periphery sources in the field of
Terrorism Studies. Additionally, full-text and reference retrieval systems have been employed to expand the
search.

Keywords: bibliography, resources, literature, narratives, counter-narratives, alternative narratives, Islamists,


Jihadists

NB: All websites were last visited on 21 July, 2014.See also Note for the Reader at the end of this literature list.

Bibliographies and other Resources


Hassan, Muhammad Haniff (2007, March-): counterideology 2. URL: http://counterideology2.wordpress.com

Mendelsohn, Barak et al. (n.d.-): Global Terrorism Research Project (GTRP). URL: http://gtrp.haverford.edu

Price, Eric (2012, March): Literature on Terrorism, Media, Propaganda & Cyber-Terrorism. Perspectives
on Terrorism, 6(1), 92-103. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/price-
literature-terrorism-media

Taylor, Philip M. (1995-2010). Phil Taylors Web Site. URL: http://www.webarchive.org.uk/wayback/


archive/20130822095404/http:/ics-www.leeds.ac.uk/papers/index.cfm?outfit=pmt

Tinnes, Judith (2013, February): Terrorism and the Media (including the Internet): An Extensive
Bibliography. Perspectives on Terrorism, 7(1, Suppl.), S1-S295. URL: http://www.terrorismanalysts.com/pt/
index.php/pot/article/downloadSuppFile/247/18

Books and Edited Volumes


Aboul-Enein, Youssef H. (2010): Militant Islamist Ideology: Understanding the Global Threat. Annapolis:
Naval Institute Press.

Abou-Taam, Marwan; Bigalke, Ruth (Eds.) (2006): Die Reden des Osama bin Laden. Mnchen: Diederichs.

Achcar, Gilbert (2009): The Arabs and the Holocaust: The Arab-Israeli War of Narratives. [G. M. Goshgarian,
Trans.]. New York: Metropolitan Books.

ISSN 2334-3745 111 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Aldis, Anne; Herd, Graeme P. (Eds.) (2007): The Ideological War on Terror: Worldwide Strategies for Counter-
Terrorism. (Cass Series: Political Violence). Abingdon: Routledge.

Antonello, Pierpaolo; OLeary, Alan (Eds.) (2009): Imagining Terrorism: The Rhetoric and Representation of
Political Violence in Italy 1969-2009. (Italian Perspectives, Vol. 18). London: Legenda.

Archetti, Cristina (2012): Understanding Terrorism in the Age of Global Media: A Communication Approach.
New York: Palgrave Macmillan.

Bekerman, Zvi; Zembylas, Michalinos (2012): Teaching Contested Narratives: Identity, Memory and
Reconciliation in Peace Education and Beyond. Cambridge: Cambridge University Press.

Bernardi, Daniel Leonard et al. (2012): Narrative Landmines: Rumours, Islamist Extremism, and the Struggle
for Strategic Influence. (New Directions in International Studies). New Brunswick: Rutgers University Press.

Bokhari, Kamran (in press): Voices of Jihad: New Writings on Radical Islam. (Library of Modern Middle East
Studies). London: I.B. Tauris.

Butler, Michael J. (2012): Selling a Just War: Framing, Legitimacy, and US Military Intervention. New York:
Palgrave Macmillan.

Corman, Steven R. (Ed.) (2013): Narrating the Exit from Afghanistan. Tempe: Center for Strategic
Communication.

Corman, Steven R.; Trethewey, Angela; Goodall, H. L. (Bud), Jr. (Eds.) (2008): Weapons of Mass Persuasion:
Strategic Communication to Combat Violent Extremism. (Frontiers in Political Communication, Vol. 15). New
York: Peter Lang.

de Graaf, Beatrice; Dimitriu, George; Ringsmose, Jens (Eds.) (in press): Strategic Narratives, Public Opinion
and War: Winning Domestic Support for Military Missions in Afghanistan. (Contemporary Security Studies).
Abingdon: Routledge.

Denton, Robert E., Jr. (Ed.) (2006): Language, Symbols, and the Media: Communication in the Aftermath of the
World Trade Center Attack. (New Edition). New Brunswick: Transaction Publishers.

Desai, Meghnad (2007): Rethinking Islamism: The Ideology of the New Terror. London: I.B. Tauris.

Egerton, Frazer (2011): Jihad in the West: The Rise of Militant Salafism. Cambridge: Cambridge University
Press.

El Difraoui, Asiem (2013): Al-Qaida par limage: La prophtie du martyre. (Proche Orient). Paris: Presses
Universitaires de France.

El Fadl, Khaled M. Abou (2007): The Great Theft: Wrestling Islam from the Extremists. New York:
HarperCollins.

Elter, Andreas (2005): Die Kriegsverkufer: Geschichte der US-Propaganda 1917-2005. Frankfurt: Suhrkamp.

Elter, Andreas (2008): Propaganda der Tat: Die RAF und die Medien. Frankfurt: Suhrkamp.

Fenner, Lorry M.; Stout, Mark E.; Goldings, Jessica L. (Eds.) (2012): 9.11. Ten Years Later: Insights on al-
Qaedas Past & Future through Captured Records: Conference Proceedings. [e-book]. Washington, DC: Johns
Hopkins University Center for Advanced Governmental Studies. URL: http://issuu.com/johnshopkinsaap/

ISSN 2334-3745 112 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

docs/gov1220_ndu-final-issuu

Forest, James J. F. (Ed.) (2009): Influence Warfare: How Terrorists and Governments Fight to Shape Perceptions
in a War of Ideas. Westport: Praeger Security International.

Geltzer, Joshua Alexander (2010): US Counter-Terrorism Strategy and al-Qaeda: Signalling and the Terrorist
World-View. (Contemporary Security Studies). Abingdon: Routledge.

Goodall, H. L. (Bud), Jr. (2010): Counter-Narrative: How Progressive Academics Can Challenge Extremists and
Promote Social Justice. Walnut Creek: Left Coast Press.

Goodman, Robin Truth (2009): Policing Narratives and the State of Terror. Albany: State University of New
York Press.

Halliday, Fred (2011): Shocked and Awed: A Dictionary of the War on Terror. Berkeley: University of
California Press.

Halverson, Jeffry R.; Goodall, H. L. (Bud), Jr.; Corman, Steven R. (2011): Master Narratives of Islamist
Extremism. New York: Palgrave Macmillan.

Hassan, Muhammad Haniff (2006): Unlicensed to Kill: Countering Imam Samudras Justification for the Bali
Bombing. [e-Book]. Singapore: Peace Matters. URL: http://www.p4peace.com/edisi/data/unlicensed%20
to%20kill-ebook.pdf

Hassan, Muhammad Haniff (2014): The Father of Jihad: Abd Allh Azzms Jihad Ideas and Implications to
National Security. (ICP Insurgency & Terrorism Series, Vol. 2). London: Imperial College Press.

Hodges, Adam (2011): The War on Terror Narrative: Discourse and Intertextuality in the Construction and
Contestation of Sociopolitical Reality. (Oxford Studies in Sociolinguistics). New York: Oxford University Press.

Hodges, Adam; Nilep, Chad (Eds.) (2007): Discourse, War and Terrorism. (Discourse Approaches to Politics,
Society and Culture, Vol. 24). [e-Book]. Amsterdam: John Benjamins. DOI: http://dx.doi.org/10.1075/
dapsac.24

Holbrook, Donald (in press): The Al-Qaeda Doctrine: The Framing and Evolution of the Leaderships Public
Discourse. (New Directions in Terrorism Studies). New York: Bloomsbury Academic.

Holland, Jack (2013): Selling the War on Terror: Foreign Policy Discourses after 9/11. (Critical Terrorism
Studies). Abingdon: Routledge.

Hughes, John (2010): Islamic Extremism and the War of Ideas: Lessons from Indonesia. (Hoover Institution
Press Publication No. 592). Stanford: Hoover Institution Press.

Ibrahim, Raymond (Ed. & Trans.) (2007): The Al Qaeda Reader. New York: Doubleday.

Jackson, Richard (2005): Writing the War on Terrorism: Language, Politics and Counter-Terrorism. (New
Approaches to Conflict Analysis). Manchester: Manchester University Press.

Jung, Berenike (2010): Narrating Violence in Post-9/11 Action Cinema: Terrorist Narratives, Cinematic
Narration, and Referentiality. Wiesbaden: Springer VS.

Kepel, Gilles; Milelli, Jean-Pierre (Eds.) (2008): Al Qaeda in its own Words. [Pascale Ghazaleh, Trans.]
Cambridge: Harvard University Press. (Original work published 2005 in French)

ISSN 2334-3745 113 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Lacey, Jim (Ed.) (2008): The Canons of Jihad: Terrorists Strategy for Defeating America. Annapolis: Naval
Institute Press.

Lahoud, Nelly (2010): The Jihadis Path to Self-Destruction. New York: Columbia University Press.

Lawrence, Bruce (Ed.) (2005): Messages to the World: The Statements of Osama Bin Laden. London: Verso.

Lewis, Jeff (2005): Language Wars: The Role of Media and Culture in Global Terror and Political Violence.
London: Pluto Press.

Libicki, Martin C. et al. (2007): Byting Back: Regaining Information Superiority against 21st-Century
Insurgents. (RAND Counterinsurgency Study, Vol. 1). [e-book]. Santa Monica: RAND Corporation. URL:
http://www.rand.org/pubs/monographs/MG595z1.html

Lohlker, Rdiger (Ed. & Trans.) (2009): Dschihadismus: Materialien. Vienna: facultas wuv.

Lohlker, Rdiger (Ed.) (2012): New Approaches to the Analysis of Jihadism: Online and Offline. (Studying
Jihadism, Vol. 1). Gttingen: V&R unipress.

Lohlker, Rdiger (Ed.) (2013): Jihadism: Online Discourses and Representations. (Studying Jihadism, Vol. 2).
Gttingen: V&R unipress.

Maltby, Sarah (2012): Military Media Management: Negotiating the Front Line in Mediatized War. (Media,
War and Security). Abingdon: Routledge.

Marlin, Randal (2002): Propaganda and the Ethics of Persuasion. Peterborough: Broadview Press.

Marlin, Robert O., IV (Commentator) (2004): What does Al-Qaeda Want? Unedited Communiqus. (The
Terra Nova Series). Berkeley: North Atlantic Books.

Matusitz, Jonathan (2013): Terrorism & Communication: A Critical Introduction. Thousand Oaks: SAGE.

Mearsheimer, John J. (2011): Why Leaders Lie: The Truth about Lying in International Politics. New York:
Oxford University Press.

Mirbagheri, S. M. Farid (2012): War and Peace in Islam: A Critique of Islamic/ist Political Discourses.
(Rethinking Peace and Conflict Studies). New York: Palgrave Macmillan.

Miskimmon, Alister; OLoughlin, Ben; Roselle, Laura (Eds.) (2013): Strategic Narratives: Communication
Power and the New World Order. (Routledge Studies in Global Information, Politics and Society, Vol. 3). New
York: Routledge.

Miskimmon, Alister; OLoughlin, Ben; Roselle, Laura (Eds.) (in press): Forging the World: Strategic Narratives
and International Relations. Ann Arbor: University of Michigan Press.

Mitchell, W. J. T. (2011): Cloning Terror: The War of Images, 9/11 to the Present. Chicago: University of
Chicago Press.

OHair, Dan; Heath, Robert L., Ledlow, Gerald R. (Eds.) (2005): Community Preparedness and Response to
Terrorism. (Vol. 3: Communication and the Media). (Praeger Perspectives). Westport: Praeger.

OHair, Dan et al. (Eds.) (2008): Terrorism: Communication and Rhetorical Perspectives. Cresskill: Hampton
Press.

ISSN 2334-3745 114 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

nc, A. Aykut; Bucher, Troy; Ayta, Osman (Eds.) (2009): Strategic Communication for Combating
Terrorism. [e-Book]. Ankara: Centre of Excellence Defence Against Terrorism. URL: http://www.coedat.
nato.int/publications/StratComm/StratComm2010.pdf

OShaughnessy, Nicholas Jackson (2004): Politics and Propaganda: Weapons of Mass Seduction. Ann Arbor:
University of Michigan Press.

Patrick, Brian Anse (2013): The Ten Commandments of Propaganda. London: Arktos Media.

Pisoiu, Daniela (Ed.) (2014): Arguing Counterterrorism: New Perspectives. (Critical Terrorism Studies).
Abingdon: Routledge.

Prucha, Nico (2010): Die Stimme des Dschihad: Sawt al-ihd: Al-Qidas erstes Online- Magazin. (Nr al-
hikma, Vol. 5). Hamburg: Verlag Dr. Kova.

Rajan, V. G. Julie (2011): Women Suicide Bombers: Narratives of Violence. (Critical Terrorism Studies).
Abingdon: Routledge.

Rieger, Diana; Frischlich, Lena; Bente, Gary; in cooperation with the Terrorism/Extremism
Research Unit (FTE) of the German Federal Criminal Police Office (Bundeskriminalamt) (2013):
Propaganda 2.0: Psychological Effects of Right-Wing and Islamic Extremist Internet Videos. (Polizei
+ Forschung, Vol. 44). [e-Book]. Kln: Luchterhand. URL: http://www.bka.de/nn_233148/
SharedDocs/Downloads/DE/Publikationen/Publikationsreihen/01PolizeiUndForschung/1__44__
Propaganda2.0,templateId=raw,property=publicationFile.pdf/1_44_Propaganda2.pdf

Roger, Nathan (2013): Image Warfare in the War on Terror. (New Security Challenges). Basingstoke: Palgrave
Macmillan.

Samuel, Thomas Koruth (2012): Reaching the Youth: Countering the Terrorist Narrative. [e-Book]. Kuala
Lumpur: Southeast Asia Regional Centre for Counter-Terrorism (SEARCCT). URL: http://www.searcct.gov.
my/announcement/267-monograph-reaching-the-youth-countering-the-terrorist-narrative-by-thomas-
koruth-samuel

Schmid, Alex P.; de Graaf, Janny (1982): Violence as Communication: Insurgent Terrorism and the Western
News Media. London: SAGE.

Smith, Allison G. (Ed.) (2013): The Relationship between Rhetoric and Terrorist Violence. Abingdon:
Routledge.

Tuman, Joseph S. (2010): Communicating Terror: The Rhetorical Dimensions of Terrorism. (2nd ed.) Thousand
Oaks: SAGE.

van Linschoten, Alex Strick; Kuehn, Felix (2012): Poetry of the Taliban. London: Hurst.

Winkler, Carol K. (2006): In the Name of Terrorism: Presidents on Political Violence in the Post-World War II
Era. (SUNY Series on the Presidency; SUNY Series in the Trajectory of Terror). Albany: State University of
New York Press.

Zuhur, Sherifa D. (2008, April): Precision in the Global War on Terror: Inciting Muslims through the War of
Ideas. [e-Book]. Carlisle: Strategic Studies Institute (SSI). URL: http://www.strategicstudiesinstitute.army.mil/
pubs/display.cfm?pubID=843

ISSN 2334-3745 115 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Theses
Ampofo, Lawrence Peter (2011): Terrorism 3.0: Understanding Perceptions of Technology, Terrorism and
Counter-Terrorism in Spain. (Doctoral Thesis, Royal Holloway University of London, United Kingdom).
URL: http://pure.rhul.ac.uk/portal/en/publications/terrorism-30-understanding-perceptions-of-technology-
terrorism-and-counterterrorism-in-spain%28c8b842bf-ca0d-4fc4-aa0f-423fe9c03ecf%29.html

Auer, Daniela (2013, January): Terrorismus oder Revolution? Eine kritische Reflexion der Darstellungen des
algerischen Brgerkrieges 1991-2000. (Magister Thesis, Universitt Wien, Vienna, Austria). URL: http://othes.
univie.ac.at/25753

Aysu, Murat Okan (2009): Comprendre lAl Qaedisme: Stratgies et Rponses. (Doctoral Thesis, Universit
Lumire Lyon 2, France).

Braddock, Kurt H. (2012, August): Fighting Words: The Persuasive Effect of Online Extremist Narratives on the
Radicalization Process. (Doctoral Thesis, Pennsylvania State University, State College, United States). URL:
https://etda.libraries.psu.edu/paper/15349

Caldern Snchez, Eduardo Ignacio (2012): El discurso de la seguridad democrtica en el metarrelato de la


lucha global contra el terrorismo bajo la retrica del derecho penal del enemigo. (Masters Thesis, Universidad
Nacional de Colombia, Bogot, Colombia). URL: http://www.bdigital.unal.edu.co/7743

Carlini, Matthew Francis (2009, August): The Ruins of the Future: Counter-Narratives to Terrorism in the
9/11 Literature of Don DeLillo, Jonathan Safran Foer, and Ian McEwan. (Masters Thesis, The University of
Tennessee, Knoxville, United States). URL: http://trace.tennessee.edu/utk_gradthes/28

Case, Dean J., II; Mellen, Brian C. (2009, December): Changing the Story: The Role of the Narrative in the
Success or Failure of Terrorist Groups. (Masters Thesis, Naval Postgraduate School, Monterey, United States).
URL: http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec_Case_Mellen.pdf

Casebeer, William D. (2006, March): Military Force and Culture Change: Systems, Narratives, and the Social
Transmission of Behavior in Counter-Terrorism Strategy. (Masters Thesis, Naval Postgraduate School,
Monterey, United States). URL: http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA445398

Creed, Pamela M. (2009, Fall): Myth, Memory and Militarism: The Evolution of an American War Narrative.
(Doctoral Thesis, George Mason University, Fairfax, United States). URL: http://digilib.gmu.edu:8080/xmlui/
handle/1920/5634

Delgado, Mariana Reis Videira Lima (2013): O processo de comunicao nas organizaes terroristas: Anlise
do papel da internet. (Masters Thesis, Universidade de Coimbra, Portugal). URL: https://estudogeral.sib.
uc.pt/jspui/handle/10316/23284

Dimitriu, George (2013, February): Strategic Narratives, Counternarratives and Public Support for War: The
Dutch Governments Explanation of the Uruzgan Mission and its Influence on the Dutch Public. (Masters
Thesis, Leiden University, The Hague, The Netherlands).

Dixit, Priya (2010, February): State/Terrorism: Discourses of Terrorism and State Identity-Formation. (Doctoral
Thesis, American University, Washington, DC, United States). Available from ProQuest Dissertations and
Theses database. (UMI No. 3388937)

Duffy, Maureen T. (2012, August): Turning the Kaleidoscope: Fractured Narratives and Altered Presumptions
in Anti-Terrorism Detention Practices. (Doctoral Thesis, McGill University, Montreal, Canada). URL: http://

ISSN 2334-3745 116 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

digitool.Library.McGill.CA:80/R/-?func=dbin-jump-full&object_id=116913&silo_library=GEN01

Dumas, James M. (2010): The Race for Muslim Hearts and Minds: A Social Movement Analysis of the U.S.
War on Terror and Popular Support in the Muslim World. (Doctoral Thesis, University of St Andrews, United
Kingdom). URL: http://research-repository.st-andrews.ac.uk/handle/10023/993

El-Khairy, Omar A. (2012, February): American Statecraft for a Global Digital Age: Warfare, Diplomacy
and Culture in a Segregated World. (Doctoral Thesis, London School of Economics and Political Science,
University of London, United Kingdom). URL: http://etheses.lse.ac.uk/482

Fragnon, Julien (2009): Le discours antiterroriste: La gestion politique du 11-Septembre en France. (Doctoral
Thesis, Universit Lumire Lyon 2, France). URL: http://theses.univ-lyon2.fr/documents/lyon2/2009/
fragnon_j

Gleeson, Kathleen (2012): Using the Bully Pulpit: The Construction of the War on Terror Discourse in
Australia. (Doctoral Thesis, University of New South Wales, Sydney, Australia). URL: http://handle.unsw.edu.
au/1959.4/51905

Grettano, Teresa A. (2013): Subjects of Terror: Rhetorical Education after 9/11. (Doctoral Thesis, Illinois State
University, Normal, United States). Available from ProQuest Dissertations and Theses database. (UMI No.
3609726)

Handler, Lauren Krista (2004, August): Rhetorical Terrorism: Online News Visual Representation of Suicide
Bombing. (Masters Thesis, Florida State University, Tallahassee, United States). URL: http://diginole.lib.fsu.
edu/etd/4290

Holbrook, Donald (2012, November): Understanding the Content and Framing of Al-Qaida Leadership
Communiqus. (Doctoral Thesis, University of St Andrews, Scotland).

Karam, Aime (2005): Terror and Patriotism in the United States: A Critical Analysis of Governmental
Discourses Surrounding the Attacks of September 11, 2001 and the Introduction of the Patriot Act in the U.S.A.
(Masters Thesis, University of Ottawa, Canada). URL: http://www.ruor.uottawa.ca/en/handle/10393/26939

Kenny, Noni (2013, November): Meta-Level Terrorism Futures: Constructing and Deconstructing Using Causal
Layered Analysis. (Doctoral Thesis, Queensland University of Technology, Brisbane, Australia). URL: http://
eprints.qut.edu.au/65277

Larsen, Mike (2006, August): Talking about Terrorism: An Analysis of Official Canadian Insecurity Narratives
in the Post-September 11 Context. (Masters Thesis, University of Ottawa, Canada). URL: http://hdl.handle.
net/10393/27262

Lingarajan, Faye (2011, June): As an Ideograph: Osama bin Ladens Rhetorical Weapon of Choice. (Masters
Thesis, University of Montana, Missoula, United States). URL [Campus access only]: http://etd.lib.umt.edu/
theses/available/etd-06212011-100541

Mabe, Matthew Steven (2013, April): Inciting Violent Jihad: Understanding the Impact and Appeal of English-
Speaking Radical Islamic Ideologues on International Terrorism. (Masters Thesis, Georgetown University,
Washington, DC, United States). URL: https://repository.library.georgetown.edu/handle/10822/558337

Mendes, Cristiano Garcia (2008): A construo do conceito de terrorismo: Anlise dos discursos do ex-
primeiro-ministro britnico Tony Blair. (Doctoral Thesis, Universidade de Braslia, Braslia, Brazil). URL:
http://repositorio.unb.br/handle/10482/1950

ISSN 2334-3745 117 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Mousser, Jaouad (2006): Die Konstruktion des Feindes: Eine vergleichende Studie ber Feinde und Feindbilder
nach dem 1. Weltkrieg und dem 11. September. (Magister Thesis, Universitt Konstanz, Germany). URL:
http://kops.ub.uni-konstanz.de/handle/urn:nbn:de:bsz:352-opus-18075

Pohl, Jill (2013): Al Qaedas Propaganda War: A War for Hearts and Minds. (Masters Thesis, Wright State
University, Dayton, United States). URL: http://rave.ohiolink.edu/etdc/view?acc_num=wright1389654137

Rupert, Michael L. (2013): An American Story of Insurgency: Narrative, Discourse, and Power in Knowledge
Production. (Doctoral Thesis, George Mason University, Fairfax, United States). Available from ProQuest
Dissertations and Theses database. (UMI No. 3606630)

Saifudeen, Omer Ali (2011): The Chosen: An Examination of Extremist Muslim Narratives, Discourse and
Ideologies in Cyberspace. (Doctoral Thesis, National University of Singapore). URL: http://scholarbank.nus.
edu.sg/handle/10635/34468

Saksena, Ritu (2006, May): Mapping Terrorism: Amorphous Nations, Transient Loyalties. (Doctoral Thesis,
University of Maryland, College Park, United States). URL: http://hdl.handle.net/1903/3525

Shif, Jolene (2012): Ridicule and the Radical Islamist Narrative: Countering Internet Radicalization and
Recruitment of Islamist Lone Wolf Terrorists. (Masters Thesis, American Public University System, Charles
Town, United States). URL: http://lgdata.s3-website-us-east-1.amazonaws.com/docs/679/671445/shif-2012.
pdf

Sletteland, Anja (2008, Spring): The Geopolitics of Hearts and Minds: American Public Diplomacy in
the War on Terrorism Era. (Masters Thesis, University of Oslo, Norway). URL: https://www.duo.uio.no/
handle/10852/16062

Suarez-Murias, Adiel (2013, May): Jihad is the Way and Death for the Sake of Allah is our Highest Aspiration:
A Narrative Analysis of Sayyid Qutbs Milestones. (Masters Thesis, Wake Forest University, Winston-Salem,
United States). URL: http://wakespace.lib.wfu.edu/handle/10339/38576

Suver, Stacey Andrew (2008, March): Exploding Narratives: The Literature of Terrorism in Contemporary
America. (Masters Thesis, Florida State University, Tallahassee, United States). URL: http://diginole.lib.fsu.
edu/etd/1491

Tasista, Michele M. (2002, April): Global Media and Public Affairs Communications in a New Era of Defense:
The War against Terrorism. (Masters Thesis, University of Colorado, Boulder, United States). URL: http://
handle.dtic.mil/100.2/ADA403296

Thomas, John H., II (2011, December): Minarets of War: The Way Militants Win a Media War in the Muslim
World. (Masters Thesis, Arizona State University, Phoenix, United States). URL: http://repository.asu.edu/
items/14400

Tombaugh, William (2013, August): The Rise and Fall of the Muslim Brotherhood in the Egyptian Revolution:
The Interplay of Narrative and other Factors. (Masters Thesis, University of Kansas, Lawrence, United States).
URL: http://kuscholarworks.ku.edu/dspace/handle/1808/12263

Tsui, Chin-Kuei (2014, April): Tracing the Discursive Origins of the War on Terror: President Clinton and the
Construction of New Terrorism in the Post-Cold War Era. (Doctoral Thesis, University of Otago, Dunedin,
New Zealand). URL: http://otago.ourarchive.ac.nz/handle/10523/4771

Williams, Todd Austin (2003, June): Then and Now: A Comparison of the Attacks of December 7, 1941 and

ISSN 2334-3745 118 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

September 11, 2001 as Seen in the New York Times with an Analysis of the Construction of the Current Threat to
the National Interest. (Masters Thesis, College of Arts and Sciences, Ohio University, Athens, United States).
URL: https://etd.ohiolink.edu/ap/10?0::NO:10:P10_ACCESSION_NUM:ohiou1060033786

Journal Articles and Book Chapters


Abdulla, Rasha A. (2007, April): Islam, Jihad, and Terrorism in Post-9/11 Arabic Discussion Boards.
Journal of Computer-Mediated Communication, 12(3), 1063-1081. DOI: http://dx.doi.org/10.1111/j.1083-
6101.2007.00363.x URL: http://www.it.uu.se/edu/course/homepage/avint/vt09/2.pdf

Acharya, Arabinda (2013): Construction of the Narrative. In: Ten Years after 9/11: Rethinking the Jihadist
Threat. (Routledge Security in Asia Pacific Series, Vol. 23). Abingdon: Routledge, 55-62.

Acharya, Arabinda (2013): Strategic Communication. In: Ten Years after 9/11: Rethinking the Jihadist Threat.
(Routledge Security in Asia Pacific Series, Vol. 23). Abingdon: Routledge, 66-71.

Agresti, Albert A. (2006, Winter): The Role of Interreligious Dialogue in Addressing Ideological Support for
Terrorism: Roman Catholic Perspectives. Connections, 5(3), 83-92. URL: https://pfpconsortium.org/journal-
article/role-interreligious-dialogue-addressing-ideological-support-terrorism-roman-catholic

Aldrich, Daniel P. (2012, December): Radio as the Voice of God: Peace and Tolerance Radio Programmings
Impact on Norms. Perspectives on Terrorism, 6(6), 34-60. URL: http://www.terrorismanalysts.com/pt/index.
php/pot/article/view/230

Alexander, Yonah; Swetnam, Michael S. (2012): Propaganda and Psychological Warfare. In: Al-Qaida: Ten
Years after 9/11 and beyond. Arlington: Potomac Institute Press, 51-59.

Al-Lami, Mina; Hoskins, Andrew; OLoughlin, Ben (2012): Mobilisation and Violence in the New Media
Ecology: The Dua Khalil Aswad and Camilia Shehata Cases. Critical Studies on Terrorism, 5(2), 237-256.
DOI: http://dx.doi.org/10.1080/17539153.2012.692509

Al-Marashi, Ibrahim (2013): Sadrabiliyya: The Visual Narrative of Muqtada al-Sadrs Islamist Politics and
Insurgency in Iraq. In: Christiane Gruber; Sune Haugbolle (Eds.): Visual Culture in the Modern Middle East:
Rhetoric of the Image. Bloomington: Indiana University Press, 144-163.

Al Raffie, Dina (2012, Autumn): Whose Hearts and Minds? Narratives and Counter-Narratives of Salafi
Jihadism. Journal of Terrorism Research, 3(2), 13-31. URL: http://ojs.st-andrews.ac.uk/index.php/jtr/article/
view/304

Altheide, David L. (2013): Terrorism and the National Security University: Public Order Redux. In: Norman
K. Denzin (Ed.): 40th Anniversary of Studies in Symbolic Interaction. (Studies in Symbolic Interaction, Vol.
40). Bingley: Emerald, 317-334.

Aly, Anne (2012, June): An Audience-Focused Approach to Examining Religious Extremism Online.
Australian Journal of Communication, 39(1), 1-16.

Aly, Anne (2013): The Policy Response to Home-Grown Terrorism: Reconceptualising Prevent and Resilience
as Collective Resistance. Journal of Policing, Intelligence and Counter Terrorism, 8(1), 2-18. DOI: http://dx.doi.
org/10.1080/18335330.2013.789594

Archetti, Cristina (2013): Understanding Terrorism in the Age of Global Media: A Communication Approach.

ISSN 2334-3745 119 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

New York: Palgrave Macmillan.

Ashour, Omar (2010, December): Online De-Radicalization? Countering Violent Extremist Narratives:
Message, Messenger and Media Strategy. Perspectives on Terrorism, 4(6), 15-19. URL: http://www.
terrorismanalysts.com/pt/index.php/pot/article/view/128

Atwan, Abdel Bari (2012): The Digital Battleground. In: After bin Laden: Al Qaeda, the Next Generation.
London: Saqi Books, 238-256.

Awan, Akil N. (2009, November): Success of the Meta-Narrative: How Jihadists Maintain Legitimacy. CTC
Sentinel, 2(11), 6-8. URL: http://www.ctc.usma.edu/wp-content/uploads/2010/08/CTCSentinel-Vol2Iss11.pdf

Azzam-Nusseibeh, Maha (2007): The Centrality of Ideology in Counterterrorism Strategies in the Middle
East. In: James J. F. Forest (Ed.): Countering Terrorism and Insurgency in the 21st Century: International
Perspectives. (Vol. 1: Strategic and Tactical Considerations). Westport: Praeger Security International, 319-
335.

Baines, Paul R. et al. (2010): The Dark Side of Political Marketing: Islamist Propaganda, Reversal
Theory and British Muslims. European Journal of Marketing, 44(3-4), 478-495. DOI: http://dx.doi.
org/10.1108/03090561011020543 URL: https://dspace.lib.cranfield.ac.uk/bitstream/1826/7130/1/The_Dark_
Side_of_Political_Marketing.pdf

Bale, Jeffrey M. (2013, October): Denying the Link between Islamist Ideology and Jihadist Terrorism:
Political Correctness and the Undermining of Counterterrorism. Perspectives on Terrorism, 7(5), 5-46. URL:
http://www.terrorismanalysts.com/pt/index.php/pot/article/view/290

Baran, Zeyno (2006, Winter): Countering Ideological Support for Terrorism in Europe: Muslim Brotherhood
and Hizb ut-Tahrir: Allies or Enemies? Connections, 5(3), 19-35. URL: http://connections-qj.org/node/1346

Barrett, Richard (2009): Legitimacy, Credibility and Relevance: The Tools of Terrorists and Counter-
Terrorists. In: Alex P. Schmid; Garry F. Hindle (Eds.): After the War on Terror: Regional and Multilateral
Perspectives on Counter-Terrorism Strategy. [e-Book]. London: Royal United Services Institute for Defence
and Security Studies (RUSI), 8-32.

Bartolucci, Valentina (2014): Security vs. Liberty: The Discourse on Terrorism in the United States and
Morocco and its Societal Effects. Democracy and Security, 10(1), 1-21. DOI: http://dx.doi.org/10.1080/17
419166.2013.819782 URL: http://www.researchgate.net/publication/259947917_Proofs_-_Security_vs._
Liberty_The_Discourse_on_Terrorism_in_the_United_States_and_Morocco_and_its_Societal_Effects/
file/6a85e52ea8859b8e48.pdf

Bates, Rodger A.; Mooney, Mara (2014, February): Psychological Operations and Terrorism: The Digital
Domain. The Journal of Public and Professional Sociology, 6(1), Article 2. URL: http://digitalcommons.
kennesaw.edu/jpps/vol6/iss1/2

Beg, Shazadi (2008, July): The Ideological Battle: Insight from Pakistan. Perspectives on Terrorism, 2(10), 3-9.
URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/52

Behnke, Andreas (2012): Fear as Sovereign Strategy and the Popular Tactics of Laughter. In: Christina
Hellmich; Andreas Behnke (Eds.): Knowing al-Qaeda: The Epistemology of Terrorism. (Rethinking Political
and International Theory). Farnham: Ashgate, 101-120.

Bennett, Daniel (2013, April): Exploring the Impact of an Evolving War and Terror Blogosphere

ISSN 2334-3745 120 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

on Traditional Media Coverage of Conflict. Media, War & Conflict, 6(1), 37-53. DOI: http://dx.doi.
org/10.1177/1750635212469907

Bennett Furlow, R.; Goodall, H. L. (Bud), Jr. (2011, June): The War of Ideas and the Battle of Narratives: A
Comparison of Extremist Storytelling Structures. Cultural Studies <=> Critical Methodologies, 11(3), 215-223.
DOI: http://dx.doi.org/10.1177/1532708611409530

Ben-Zedeff, Eviathar H. (2007): Media Coverage as Advertising. In: Centre of Excellence Defence Against
Terrorism (COEDAT) (Ed.): The Media: The Terrorists Battlefield. (NATO Science for Peace and Security
Series E: Human and Societal Dynamics, Vol. 17). Amsterdam: IOS Press, 3-20.

Berman, Ilan (2009, Fall): Messaging to the (Muslim) Masses. The Journal of International Security Affairs, 17.
URL: http://www.ilanberman.com/6663/messaging-to-the-muslim-masses

Betz, David (2008): The Virtual Dimension of Contemporary Insurgency and Counterinsurgency. Small
Wars & Insurgencies, 19(4), 510-540. DOI: http://dx.doi.org/10.1080/09592310802462273 URL: http://www.
windsofchange.net/virtual-dimension-of-contemporary-insurgency-and-counterinsurgency.pdf

Bockstette, Carsten (2009, Summer): Taliban and Jihadist Terrorist Use of Strategic Communication.
Connections, 8(3), 1-24. URL: https://www.diils.org/journal-article/taliban-and-jihadist-terrorist-use-
strategic-communication

Bockstette, Carsten (2010, October): Terrorists Exploit Information Technologies: Use of Strategic
Communication Calls for United Response. per Concordiam, 1(3), 11-19. URL: http://www.marshallcenter.
org/mcpublicweb/MCDocs/files/College/F_Publications/perConcordiam/pC_V1N3_en.pdf

Boehmer, Elleke (2009): Response to Ahdaf Soueif. In: Chris Miller (Ed.): War on Terror. (The Oxford
Amnesty Lectures 2006). Manchester: Manchester University Press, 43-46. URL: http://www.elac.ox.ac.uk/
downloads/Rodin%20-%20In%20Miller,%20War%20on%20Terror.pdf

Boubakeur, Dalil (2006, Winter): Reaching Out to Muslim Clerics: Can we Build Bridges and Strengthen
Moderate Voices in Islam? Connections, 5(3), 51-55. URL: https://pfpconsortium.org/journal-article/
reaching-out-muslim-clerics-can-we-bulid-bridges-and-strengthen-moderate-voices-isla

Boucek, Christopher (2008, August): The Sakinah Campaign and Internet Counter-Radicalization in Saudi
Arabia. CTC Sentinel, 1(9), 1-4. URL: http://www.ctc.usma.edu/wp-content/uploads/2010/07/CTCSentinel-
Vol1Iss9.pdf

Boudali, Lianne Kennedy (2009, April): Leveraging History in AQIM Communications. CTC Sentinel, 2(4),
14-17. URL: http://www.ctc.usma.edu/wp-content/uploads/2010/07/CTCSentinel-Vol2Iss4.pdf

Bowdish, Randall G. (2009): Cry Terror and Let Slip the Media Dogs. In: A. Aykut nc; Troy Bucher;
Osman Ayta (Eds.): Strategic Communication for Combating Terrorism. [e-Book]. Ankara: Centre of
Excellence Defence Against Terrorism, 46-59. URL: http://www.tmmm.tsk.tr/publications/StratComm/
StratComm2010.pdf

Brachman, Jarret (2007, December): Abu Yahyas Six Easy Steps for Defeating al-Qaeda. Perspectives on
Terrorism, 1(5), 9-13. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/18/

Breton, Larisa; Pearson, Adam (2010, November 6): Contextual Truth-Telling to Counter Extremist-
Supportive Messaging Online: The Wikileaks Collateral Murder Case Study. Small Wars Journal, 6(10).
URL: http://smallwarsjournal.com/jrnl/art/contextual-truth-telling-to-counter-extremist-supportive-

ISSN 2334-3745 121 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

messaging-online

Briant, Emma L. (2007): The Struggle for Public Opinion within the Media and Information War on
Terror. In: Centre of Excellence Defence Against Terrorism (COEDAT) (Ed.): The Media: The Terrorists
Battlefield. (NATO Science for Peace and Security Series E: Human and Societal Dynamics, Vol. 17).
Amsterdam: IOS Press, 89-107.

Brodersen, Dirk (2009): The Importance of the Information Factor at the Tactical Level in COIN Operations.
In: A. Aykut nc; Troy Bucher; Osman Ayta (Eds.): Strategic Communication for Combating Terrorism.
[e-Book]. Ankara: Centre of Excellence Defence Against Terrorism, 36-45. URL: http://www.tmmm.tsk.tr/
publications/StratComm/StratComm2010.pdf

Busch, Peter (2009): Media Coverage of the 2008 Mumbai Attacks: Active Audience and Strategic
Communication. In: A. Aykut nc; Troy Bucher; Osman Ayta (Eds.): Strategic Communication for
Combating Terrorism. [e-Book]. Ankara: Centre of Excellence Defence Against Terrorism, 72-81. URL:
http://www.tmmm.tsk.tr/publications/StratComm/StratComm2010.pdf

Butler, Judith (2013): The Discourse of Terror. In: Cihan Aksan; Jon Bailes (Eds. & Interviewers): Weapon of
the Strong: Conversations on U.S. State Terrorism. London: Pluto Press, 109-117.

Byman, Daniel (2008): The War of Ideas. In: The Five Front War: The Better Way to Fight Global Jihad.
Hoboken: John Wiley & Sons, 173-190.

Campana, Aurlie (2014): The Multiple Contexts of Russian Counterterrorism Frames: The Framing
Process and Discursive Field. In: Daniela Pisoiu (Ed.): Arguing Counterterrorism: New Perspectives. (Critical
Terrorism Studies). Abingdon: Routledge, 247-269.

Cheong, Pauline Hope; Halverson, Jeffry R. (2010): Youths in Violent Extremist Discourse: Mediated
Identifications and Interventions. Studies in Conflict & Terrorism, 33(12), 1104-1123. DOI: http://dx.doi.org/1
0.1080/1057610X.2010.523862

Cheong, Pauline Hope; Lundry, Chris (2012, April): Prosumption, Transmediation, and Resistance:
Terrorism and Man-Hunting in Southeast Asia. American Behavioral Scientist, 56(4), 488-510. DOI: http://
dx.doi.org/10.1177/0002764211429365

Ciovacco, Carl J. (2009): Could Al Qaedas own Strategy to Defeat itself Actually Work? Journal of Policing,
Intelligence and Counter Terrorism, 4(2), 53-69. DOI: http://dx.doi.org/10.1080/18335300.2009.9686932 URL:
http://dspace.cigilibrary.org/jspui/bitstream/123456789/27050/1/Could%20Al%20Qaedas%20Own%20
Strategy%20to%20Defeat%20Itself%20Actually%20Work.pdf

Ciovacco, Carl J. (2009): The Contours of Al Qaedas Media Strategy. Studies in Conflict & Terrorism, 32(10),
853-875. DOI: http://dx.doi.org/10.1080/10576100903182377

Clment, Mava (2014): Al-Muhajiroun in the United Kingdom: The Role of International Non-Recognition
in Heightened Radicalization Dynamics. Global Discourse. Advance Online Publication. DOI: http://dx.doi.or
g/10.1080/23269995.2014.918306

Conway, Lucian Gideon, III; Conway, Kathrene R. (2011): The Terrorist Rhetorical Style and its
Consequences for Understanding Terrorist Violence. Dynamics of Asymmetric Conflict, 4(2), 175-192. DOI:
http://dx.doi.org/10.1080/17467586.2011.627940 URL: http://psychweb.psy.umt.edu/conway/Documents/
conway_conway_DAC_2011.pdf

ISSN 2334-3745 122 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Conway, Lucian Gideon, III et al. (2011): The Hidden Implications of Radical Group Rhetoric: Integrative
Complexity and Terrorism. Dynamics of Asymmetric Conflict, 4(2), 155-165. DOI. http://dx.doi.org/10.1080/1
7467586.2011.627938 URL: http://psychweb.psy.umt.edu/conway/Documents/conwayetal_DAC_2011.pdf

Cook, David B. (2006): The Role of Islam as a Motivating Factor in Usama bin Ladins Appeal within the
Muslim World. In David G. Kamien (Ed.): The McGraw-Hill Homeland Security Handbook: The Definitive
Guide for Law Enforcement, EMT, and all other Security Professionals. New York: McGraw-Hill, 37-52.

Cook, David B. (2012): The Collapse of Religious Justifications for the Globalist Radical Muslims. In: Lorry
M. Fenner; Mark E. Stout; Jessica L. Goldings (Eds.): 9.11. Ten Years Later: Insights on al-Qaedas Past &
Future through Captured Records: Conference Proceedings. Washington, DC: Johns Hopkins University Center
for Advanced Governmental Studies, 94-99. URL: http://issuu.com/johnshopkinsaap/docs/gov1220_ndu-
final-issuu

Corman, Steven R. (2006, Winter): Weapons of Mass Persuasion: Communicating against Terrorist Ideology.
Connections, 5(3), 93-105. URL: http://connections-qj.org/node/1360

Corman, Steven R. (2008, February): Complex Systems Problems in the War of Ideas. Perspectives on
Terrorism, 2(3), 6-9. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/30

Corman, Steven R. (2013): Toward a Fitting End: Concluding the Afghanistan War Narrative. In: Steven R.
Corman (Ed.): Narrating the Exit from Afghanistan. Tempe: Center for Strategic Communication, 117-143.

Corman, Steven R.; Brachman, Jarret M. (2007, May 1): How to Win Enemies and Disgust People. COMOPS
Journal. URL: http://csc.asu.edu/2007/05/01/how-to-win-enemies-and-disgust-people

Corman, Steven R.; Dooley, Kevin J. (2009): Strategic Communication on a Rugged Landscape: Principles for
Finding the Right Message. In: A. Aykut nc; Troy Bucher; Osman Ayta (Eds.): Strategic Communication
for Combating Terrorism. [e-Book]. Ankara: Centre of Excellence Defence Against Terrorism, 98-110. URL:
http://www.tmmm.tsk.tr/publications/StratComm/StratComm2010.pdf

Corman, Steven R.; Hitchcock, Steven (2013): Media Use and Source Trust among Muslims in Seven
Countries: Results of a Large Random Sample Survey. Journal of Strategic Security, 6(4), Article 2. URL:
http://scholarcommons.usf.edu/jss/vol6/iss4/2

Cross, Sharyl N. (2013): Russia and Countering Violent Extremism in the Internet and Social Media:
Exploring Prospects for U.S.-Russia Cooperation beyond the Reset. Journal of Strategic Security, 6(4),
Article 1. URL: http://scholarcommons.usf.edu/jss/vol6/iss4/1

Crowley, P. J. (2009): The Battle of Narratives: The Real Central Front against Al Qaeda. In: Matthew J.
Morgan (Ed.): The Impact of 9/11 on the Media, Arts, and Entertainment: The Day that Changed Everything?
New York: Palgrave Macmillan, 37-50. DOI: http://dx.doi.org/10.1057/9780230101616

Dalgaard-Nielsen, Anja (2013): Promoting Exit from Violent Extremism: Themes and Approaches. Studies
in Conflict & Terrorism, 36(2), 99-115. DOI: http://dx.doi.org/10.1080/1057610X.2013.747073 URL: http://
counterideology2.files.wordpress.com/2013/01/promoting-exit-from-violent-extremism.pdf

Danowski, James A. (2008): Evaluative Word Locations in Semantic Networks from News Stories about Al
Qaeda and Implications for Optimal Communication Messages in Anti-Terrorism Campaigns. In: Daniel
Ortiz-Arroyo et al. (Eds.): Intelligence and Security Informatics: First European Conference, EuroISI 2008,
Esbjerg, Denmark, December 3-5, 2008: Proceedings. (Lecture Notes in Computer Science, Vol. 5376). Berlin:

ISSN 2334-3745 123 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Springer, 271-273. DOI: http://dx.doi.org/10.1007/978-3-540-89900-6_27

Dantschke, Claudia (2014): Da habe ich etwas gesehen, was mir einen Sinn gibt. Was macht Salafismus
attraktiv und wie kann man diesem entgegenwirken? In: Behnam T. Said; Hazim Fouad (Eds.): Salafismus:
Die Suche nach dem wahren Islam. Freiburg: Herder, 474-502.

Dartnell, Michael (1999): Insurgency Online: Elements for a Theory of AntiGovernment


Internet Communications. Small Wars & Insurgencies, 10(3), 116-135. DOI: http://dx.doi.
org/10.1080/09592319908423252

Dauber, Cori E. (2009, January-February): The Truth is Out There: Responding to Insurgent Disinformation
and Deception Operations. Military Review, 1-2/2009, 13-24. URL: http://usacac.army.mil/CAC2/
MilitaryReview/Archives/English/MilitaryReview_20090228_art005.pdf

Davis, Victoria (2013, August): Reading Anonymity: Narrative Difference and Framework Selection
in the Claiming of Terrorist Violence. Media, War & Conflict, 6(2), 135-151. DOI: http://dx.doi.
org/10.1177/1750635213481087

Day, Michael (2010, December): From Inspiring to Instructing: The Significance of the March 2010
Adam Gadahn Propaganda Statement. Media, War & Conflict, 3(3), 355-364. DOI: http://dx.doi.
org/10.1177/1750635210386417

de Graaf, Beatrice (2009, August): Counter-Narratives and the Unrehearsed Stories Counter-Terrorists
Unwittingly Produce. Perspectives on Terrorism, 3(2), 5-11. URL: http://www.terrorismanalysts.com/pt/index.
php/pot/article/view/65

Dimitriu, George (2012, June): Winning the Story War: Strategic Communication and the Conflict in
Afghanistan. Public Relations Review, 38(2), 195-207. DOI: http://dx.doi.org/10.1016/j.pubrev.2011.11.011
URL: http://www.academia.edu/3091193/Winning_the_story_war_Strategic_communication_and_the_
conflict_in_Afghanistan

Duarte, Felipe Parth (2011): Political Subversion or Religious Violence: The Threat of Al-Qaeda Ideology in
Europe. In: Diogo Pires Aurlio; Joo Tiago Proena (Eds.): Terrorism: Politics, Religion, Literature. Newcastle:
Cambridge Scholars Publishing, 129-142.

Edwards, Aaron; McGrattan, Cillian (2011): Terroristic Narratives: On the (Re) Invention of Peace in
Northern Ireland. Terrorism and Political Violence, 23(3), 357-376. DOI: http://dx.doi.org/10.1080/09546553.
2010.542074

Egerton, Frazer (2011): Why me? The Role of Broader Narratives and Intermediaries. In: Jihad in the West:
The Rise of Militant Salafism. Cambridge: Cambridge University Press, 132-158.

Egner, Michael (2009): Social-Science Foundations for Strategic Communications in the Global War on
Terrorism. In: Paul K. Davis; Kim Cragin (Eds.): Social Science for Counterterrorism: Putting the Pieces
Together. (RAND Monographs, MG-849-OSD). [e-Book]. Santa Monica: RAND Corporation, 323-365. URL:
http://www.rand.org/pubs/monographs/MG849.html

El-Affendi, Abdelwahab (2009): A Clash of Xenophobic Narratives: The Symbiotic Relationship between
Islamophobia and Extremism. SEARCCTs Selection of Articles, 1(1), 30-56. URL: http://www.searcct.gov.my/
images/PDF_My/publication/searcct_selection_of_articles.pdf

El Gazzar, Nagwa (2013, March): The Role of Social Media in the Formation of Public Opinion towards

ISSN 2334-3745 124 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Islamists: A Content Analysis. Journal of Arab & Muslim Media Research, 6(1), 35-49. DOI: http://dx.doi.
org/10.1386/jammr.6.1.35_1

Elmaz, Orhan (2012): Jihadi-Salafist Creed: Abu Muhammad al-Maqdisis Imperatives of Faith. In: Rdiger
Lohlker (Ed.): New Approaches to the Analysis of Jihadism: Online and Offline. (Studying Jihadism, Vol. 1).
Gttingen: V&R unipress, 15-36. URL: http://www.academia.edu/1139288/Jihadi-Salafist_Creed_Abu_
Muhammad_al-Maqdisis_imperatives_of_faith

Elmaz, Orhan (2013): Traditions to Die For: Abu Yahya al-Libis Collection of 40 Hadith. In: Rdiger Lohlker
(Ed.): Jihadism: Online Discourses and Representations. (Studying Jihadism, Vol. 2). Gttingen: V&R unipress,
89-102.

Elter, Andreas; Weichert, Stephan (2011): Terrorismus 2.0: ber die Propaganda der Tat im digitalen
Zeitalter. In: Thomas Jger (Ed.): Die Welt nach 9/11: Auswirkungen des Terrorismus auf Staatenwelt und
Gesellschaft. (Sonderheft der Zeitschrift fr Auen- und Sicherheitspolitik, 2/2011). Wiesbaden: VS Verlag
fr Sozialwissenschaften, 946-967. DOI: http://dx.doi.org/10.1007/978-3-531-94173-8_46

Fahoum, Keely M.; Width, Jon (2006, November): Marketing Terror: Effects of Anti-Messaging on GSPC
Recruitment. Strategic Insights, 5(8). URL: http://calhoun.nps.edu/public/bitstream/handle/10945/11169/
fahoumNov06.pdf

Farwell, James P. (2010): Jihadi Video in the War of Ideas. Survival, 52(6), 127-150. http://dx.doi.org/10.108
0/00396338.2010.540787

Federman, Cary (2006): Habeas Corpus and the Narratives of Terrorism, 1996-2002. In: The Body and the
State: Habeas Corpus and American Jurisprudence. (SUNY Series in American Constitutionalism). Albany:
State University of New York Press, 157-184.

Fischhoff, Baruch (2011, September): Communicating about the Risks of Terrorism (or anything else).
American Psychologist, 66(6), 520-531. DOI: http://dx.doi.org/10.1037/a0024570 URL: https://www.cmu.edu/
dietrich/sds/docs/fischhoff/AP%20Fischhoff.pdf

Forest, James J. F. (2012, March): Perception Challenges Faced by Al-Qaeda on the Battlefield of Influence
Warfare. Perspectives on Terrorism, 6(1), 8-22. URL: http://www.terrorismanalysts.com/pt/index.php/pot/
article/view/forest-perception-challenges

Foxley, Tim (2010, December): Countering Taliban Information Operations in Afghanistan. PRISM, 1(4), 79-
94. URL: http://cco.dodlive.mil/files/2014/02/Prism_79-94_Foxley.pdf

Fulford, Carlton W., Jr. (2006, Winter): Countering Ideological Support for Extremism: Challenges and
Implications. Connections, 5(3), 3-6. URL: https://pfpconsortium.org/journal-article/countering-ideological-
support-extremism-challenges-and-implications

Garagozov, Rauf (2013): Implicit Measures of Attitude Change via Narrative Intervention in the Karabakh
Conflict. Dynamics of Asymmetric Conflict, 6(1-3), 98-109. DOI: http://dx.doi.org/10.1080/17467586.2013.86
1919

Garner, George (2011, January): Case Studies in Exploiting Terrorist Group Divisions with Disinformation
and Divisive/Black Propaganda. Journal of Terrorism Research, 1(1), 3-14. URL: http://ojs.st-andrews.ac.uk/
index.php/jtr/article/view/164

Gelpi, Christopher; Roselle, Laura; Barnett, Brooke (2013, January): Polarizing Patriots: Divergent Responses

ISSN 2334-3745 125 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

to Patriotic Imagery in News Coverage of Terrorism. American Behavioral Scientist, 57(1), 8-45. DOI: http://
dx.doi.org/10.1177/0002764212463358

Goodall, H. L. (Bud), Jr. et al. (2012, March): Rhetorical Charms: The Promise and Pitfalls of Humor and
Ridicule as Strategies to Counter Extremist Narratives. Perspectives on Terrorism, 6(1), 70-79. URL: http://
www.terrorismanalysts.com/pt/index.php/pot/article/view/goodall-et-al-rhetorical

Green, Melanie C.; Brock, Timothy C. (2000, November): The Role of Transportation in the Persuasiveness
of Public Narratives. Journal of Personality and Social Psychology, 79(5), 701-721. DOI: http://dx.doi.
org/10.1037/0022-3514.79.5.701

Greenberg, Karen J. (2005): Part II: In his own Words: Statements by Osama bin Laden. In: Karen J.
Greenberg (Ed.): Al Qaeda Now: Understanding Todays Terrorists. Cambridge: Cambridge University Press,
159-248.

Greene, Viveca (2011): Critique, Counternarratives, and Ironic Intervention in South Park and Stephen
Colbert. In: Ted Gournelos; Viveca Greene (Eds.): A Decade of Dark Humor: How Comedy, Irony, and Satire
Shaped Post-9/11 America. Jackson: University Press of Mississippi, 119-136.

Gregory, Bruce (2007): Public Diplomacy as Strategic Communication. In: James J. F. Forest (Ed.): Countering
Terrorism and Insurgency in the 21st Century: International Perspectives. (Vol. 1: Strategic and Tactical
Considerations). Westport: Praeger Security International, 336-357.

Gler, Rza (2012, November): The Role and Place of Strategic Communication in Countering Terrorism. The
Journal of Defense Sciences, 11(2), 1-31. URL: http://www.kho.edu.tr/akademik/enstitu/savben_dergi/112/
Makale1.pdf

Gutirrez Sann, Francisco; Wood, Elisabeth Jean (2014, March): Ideology in Civil War:
Instrumental Adoption and beyond. Journal of Peace Research, 51(2), 213-226. DOI: http://dx.doi.
org/10.1177/0022343313514073

Gygax, Jrme; Snow, Nancy (2013, July): 9/11 and the Advent of Total Diplomacy: Strategic Communication
as a Primary Weapon of War. Journal of 9/11 Studies, 38. URL: http://www.journalof911studies.com/
resources/2013GygaxSnowVol38Jul.pdf

Hafez, Mohammed M. (2007): Martyrdom Mythology in Iraq: How Jihadists Frame Suicide Terrorism
in Videos and Biographies. Terrorism and Political Violence, 19(1), 95-115. DOI: http://dx.doi.
org/10.1080/09546550601054873 URL: http://www1.international.ucla.edu/media/files/Martyrdom%20
Mythology%20in%20Iraq.pdf

Handley, Robert L. (2008, April): Israeli Image Repair: Recasting the Deviant Actor to Retell the Story.
Journal of Communication Inquiry, 32(2), 140-154. DOI: http://dx.doi.org/10.1177/0196859907311695

Handley, Robert L. (2009): The Conflicting Israeli-Terrorist Image: Managing the Israeli-Palestinian
Narrative in the New York Times and Washington Post. Journalism Practice, 3(3), 251-267. DOI: http://
dx.doi.org/10.1080/17512780902798711

Handley, Robert L.; Ismail, Amani (2010, December): Territory under Siege: Their News, our News
and ours both News of the 2008 Gaza Crisis. Media, War & Conflict, 3(3), 279-297. DOI: http://dx.doi.
org/10.1177/1750635210364690 URL: http://teroauvinen3.files.wordpress.com/2013/07/media-war-conflict-
2010-handley-279-97.pdf

ISSN 2334-3745 126 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Hart, Roderick P.; Lind, Colene J. (2011): The Rhetoric of Islamic Activism: A DICTION Study. Dynamics of
Asymmetric Conflict, 4(2), 113-125. DOI: http://dx.doi.org/10.1080/17467586.2011.627934

Hassan, Muhammad Haniff (2012): Key Considerations in Counterideological Work against Terrorist
Ideology. In: John Horgan; Kurt Braddock (Eds.): Terrorism Studies: A Reader. Abingdon: Routledge, 358-384.

Heller, Regina; Kahl, Martin; Pisoiu, Daniela (2013): Editors Introduction: The Dark Side of Normative
Argumentation in Counterterrorism: An Emerging Research Field. Critical Studies on Terrorism, 6(3), 410-
413. DOI: http://dx.doi.org/10.1080/17539153.2013.836304

Hellmich, Christina (2010): The Physiology of Al-Qaeda: From Ideology to Participation. In: Magnus
Ranstorp (Ed.): Understanding Violent Radicalisation: Terrorist and Jihadist Movements in Europe. Abingdon:
Routledge, 68-86.

Hellmich, Christina (2012): Here Come the Salafis: The Framing of al-Qaedas Ideology within Terrorism
Research. In: Christina Hellmich; Andreas Behnke (Eds.): Knowing al-Qaeda: The Epistemology of Terrorism.
Farnham: Ashgate, 11-28.

Helmus, Todd C.; Paul, Christopher; Glenn, Russell W. (2009): The Marketing Approach to Earning
Popular Support in Theaters of Operation. In: A. Aykut nc; Troy Bucher; Osman Ayta (Eds.): Strategic
Communication for Combating Terrorism. [e-Book]. Ankara: Centre of Excellence Defence Against
Terrorism, 60-71. URL: http://www.tmmm.tsk.tr/publications/StratComm/StratComm2010.pdf

Hermann, Margaret G.; Sakiev, Azamat (2011): Leadership, Terrorism, and the Use of Violence. Dynamics of
Asymmetric Conflict, 4(2), 126-134. DOI: http://dx.doi.org/10.1080/17467586.2011.627935

Hochberg-Marom, Anat (2009): Al-Qaeda: Its Global Marketing Strategy. In: Umberto Gori (Ed.):
Modelling Cyber Security: Approaches, Methodology, Strategies. (NATO Science for Peace and Security
Series E: Human and Societal Dynamics, Vol. 59): Amsterdam: IOS Press, 109-113. DOI: http://dx.doi.
org/10.3233/978-1-60750-074-2-109

Holbrook, Donald (2010, July): Using the Quran to Justify Terrorist Violence: Analysing Selective
Application of the Quran in English-Language Militant Islamist Discourse . Perspectives on Terrorism, 4(3),
15-28. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/104

Holbrook, Donald (2011): Al-Qaeda Communiqus by Bin Laden and Al-Zawahiri: A Chronology. In: Alex
P. Schmid (Ed.): The Routledge Handbook of Terrorism Research. Abingdon: Routledge, 280-293.

Holbrook, Donald (2012, December): Al-Qaedas Response to the Arab Spring. Perspectives on Terrorism,
6(6), 4-21. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/228

Holbrook, Donald (2013): Alienating the Grassroots: Looking Back at Al Qaedas Communicative Approach
toward Muslim Audiences. Studies in Conflict & Terrorism, 36(11), 883-898. DOI: http://dx.doi.org/10.1080/1
057610X.2013.832116 URL: http://counterideology2.files.wordpress.com/2013/10/al-qaedas-communicative-
approach-toward-muslim-audiences.pdf

Holbrook, Donald; Taylor, Max (2014): Developing Grading Processes for Ideological Content. Journal of
Policing, Intelligence and Counter Terrorism, 9(1), 32-47. DOI: http://dx.doi.org/10.1080/18335330.2013.8773
75

Holland, Jack (2014): The Elusive Essence of Evil: Constructing Otherness in the Coalition of the Willing.
In: Daniela Pisoiu (Ed.): Arguing Counterterrorism: New Perspectives. (Critical Terrorism Studies). Abingdon:

ISSN 2334-3745 127 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Routledge, 201-220. URL: http://drjackholland.files.wordpress.com/2013/02/jack-holland-elusive-essence-of-


evil-arguing-counterterrorism.pdf

Holtmann, Philipp (2012): Virtual Leadership: How Jihadists Guide Each Other in Cyberspace. In: Rdiger
Lohlker (Ed.): New Approaches to the Analysis of Jihadism: Online and Offline. (Studying Jihadism, Vol. 1).
Gttingen: V&R unipress, 63-124.

Holtmann, Philipp (2013): Casting Supernatural Spells and Fostering Communitas: Abu Yahya Al- Libis
Qasida Poetry. In: Rdiger Lohlker (Ed.): Jihadism: Online Discourses and Representations. (Studying
Jihadism, Vol. 2). Gttingen: V&R unipress, 103-120.

Holtmann, Philipp (2013, April): Countering Al-Qaedas Single Narrative. [Op-Ed]. Perspectives on Terrorism,
7(2), 141-146. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/262

Jacobson, Michael (2009, August): Terrorist Drop-outs: One Way of Promoting a Counter-Narrative.
Perspectives on Terrorism, 3(2), 12-17. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/
view/66

Jahng, Mi Rosie; Hong, Seoyeon; Park, Eun Hae (2014, March): How Radical is Radical? Understanding
the Role of Activists Communication Strategies on the Formation of Public Attitude and Evaluation. Public
Relations Review, 40(1), 119-121. DOI: http://dx.doi.org/10.1016/j.pubrev.2013.11.004

Janssen, Elmar (2011): Kommunikationsmanagement und Kriegsfhrung im 21. Jahrhundert: Die neue Art
des Feindkontakts zwischen psychologischer Kampffhrung und PR-Schlachten nach 9/11. In: Thomas Jger
(Ed.): Die Welt nach 9/11: Auswirkungen des Terrorismus auf Staatenwelt und Gesellschaft. (Sonderheft der
Zeitschrift fr Auen- und Sicherheitspolitik, 2/2011). Wiesbaden: VS Verlag fr Sozialwissenschaften, 717-
738. DOI: http://dx.doi.org/10.1007/978-3-531-94173-8_35

Jarvis, Lee (2014): Terrorism, Discourse and Analysis Thereof: A Reply to Clment. Global Discourse.
Advance Online Publication. DOI: http://dx.doi.org/10.1080/23269995.2014.930599

Johnson, Thomas H. (2007, September): The Taliban Insurgency and an Analysis of Shabnamah (Night
Letters). Small Wars & Insurgencies, 18(3), 317-344. DOI: http://dx.doi.org/10.1080/09592310701674176
URL: http://www.nps.edu/programs/ccs/Docs/Pubs/Small_Wars_%20Pub.pdf

Johnson, Thomas H.; Steele, Kevin L. (2013): The Taliban Narrative: Understanding the Groups Messages,
Actions and Clues to their Endgame. In: Steven R. Corman (Ed.): Narrating the Exit from Afghanistan.
Tempe: Center for Strategic Communication, 71-98.

Johnson, Thomas H.; Waheed, Ahmad (2011): Analyzing Taliban Taranas (Chants): An Effective Afghan
Propaganda Artifact. Small Wars & Insurgencies, 22(1), 3-31. DOI: http://dx.doi.org/10.1080/09592318.2011.
546572 URL: http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA539768

Jones, David Martin; Smith, M. L. R. (2013): Myth and the Small War Tradition: Reassessing the Discourse of
British Counter-Insurgency. Small Wars & Insurgencies, 24(3), 436-464. DOI: http://dx.doi.org/10.1080/0959
2318.2013.802604

Kamolnick, Paul (2013, October): The Egyptian Islamic Groups Critique of Al-Qaedas Interpretation of
Jihad. Perspectives on Terrorism, 7(5), 93-110. URL: http://www.terrorismanalysts.com/pt/index.php/pot/
article/view/293

Kearns, Erin M.; Conlon, Brendan; Young, Joseph K. (2014): Lying about Terrorism. Studies in Conflict

ISSN 2334-3745 128 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

& Terrorism, 37(5), 422-439. DOI: http://dx.doi.org/10.1080/1057610X.2014.893480 URL: http://www.


erinmkearns.com/uploads/2/4/5/5/24559611/kearns_conlon__young_2014.pdf

Khalil, Hanif (2012, December): Condemnation of War and Terror in Pashto Poetry: Post 9/11
Scenario. TIGAH: A Journal of Peace and Development, 2, 41-65. URL: http://frc.com.pk/wp-content/
uploads/2013/01/31.pdf

Knysh, Alexander (2012): Islam and Arabic as the Rhetoric of Insurgency: The Case of the Caucasus Emirate.
Studies in Conflict & Terrorism, 35(4), 315-337. DOI: http://dx.doi.org/10.1080/1057610X.2012.656343

Krawchuk, Fred T. (2006, Winter): Strategic Communication: An Integral Component of Counterinsurgency


Operations. Connections, 5(3), 35-50. URL: https://pfpconsortium.org/journal-article/strategic-
communication-integral-component-counterinsurgency-operations

Laity, Mark (2009): Strategic Communication. In: A. Aykut nc; Troy Bucher; Osman Ayta (Eds.):
Strategic Communication for Combating Terrorism. [e-Book]. Ankara: Centre of Excellence Defence Against
Terrorism, 11-14. URL: http://www.tmmm.tsk.tr/publications/StratComm/StratComm2010.pdf

Larson, Eric V. (2011): Al Qaedas Propaganda: A Shifting Battlefield. In: Brian Michael Jenkins; John Paul
Godges (Eds.): The Long Shadow of 9/11: Americas Response to Terrorism. (RAND Monographs, MG-1107-
RC). [e-book]. Santa Monica: RAND Corporation, 71-85. URL: http://www.rand.org/pubs/monographs/
MG1107.html

Lehr, Peter; Ramsay, Gilbert (2014): Responding to Terrorism and Ideologies of Hate. In: Siegfried O. Wolf
et al. (Eds.): The Merits of Regional Cooperation: The Case of South Asia. Cham: Springer, 11-21. DOI: http://
dx.doi.org/10.1007/978-3-319-02234-5_2

Lemieux, Anthony F. et al. (2014): Inspire Magazine: A Critical Analysis of its Significance and Potential
Impact through the Lens of the Information, Motivation, and Behavioral Skills Model. Terrorism and Political
Violence, 26(2), 354-371. DOI: http://dx.doi.org/10.1080/09546553.2013.828604

Leuprecht, Christian et al. (2009, August): Winning the Battle but Losing the War? Narrative and Counter-
Narratives Strategy. Perspectives on Terrorism, 3(2), 25-35. URL: http://www.terrorismanalysts.com/pt/index.
php/pot/article/view/68

Lia, Brynjar (2008, May): Al-Qaidas Appeal: Understanding its Unique Selling Points. Perspectives on
Terrorism, 2(8), 3-10. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/44

Loadenthal, Michael (2014, June): Eco-Terrorism? Countering Dominant Narratives of Securitisation: A


Critical, Quantitative History of the Earth Liberation Front (1996-2009). Perspectives on Terrorism, 8(3), 16-
50. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/345

Lohlker, Rdiger (2013): Religion, Weapons, and Jihadism Emblematic Discourses. In: Rdiger Lohlker (Ed.):
Jihadism: Online Discourses and Representations. (Studying Jihadism, Vol. 2). Gttingen: V&R unipress, 65-
88.

Lundry, Chris; Cheong, Pauline Hope (2011): Rumors and Strategic Communication: The Gendered
Construction and Transmediation of a Terrorist Life Story. In: Timothy Kuhn (Ed.): Matters of
Communication: Political, Cultural, and Technological Challenges to Communication Theorizing. New York:
Hampton Press, 145-166.

Lundry, Chris et al. (2012): Cooking the Books: Strategic Inflation of Casualty Reports by Extremists in the

ISSN 2334-3745 129 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Afghanistan Conflict. Studies in Conflict & Terrorism, 35(5), 369-381. DOI: http://dx.doi.org/10.1080/105761
0X.2012.666821

MacDonald, Malcolm N.; Hunter, Duncan; ORegan, John P. (2013): Citizenship, Community, and Counter-
Terrorism: UK Security Discourse, 2001-2011. Journal of Language and Politics, 12(3), 445-473. DOI: http://
dx.doi.org/10.1075/jlp.12.3.07mac URL: http://wrap.warwick.ac.uk/54268/1/WRAP_MACDONALD_
HUNTER_OREGAN_LangPol_2012_FIN.pdf

Makoni, Sinfree (2013, March): Discourses of Terror: The U.S. from the Viewpoint of the Other. Applied
Linguistics Review, 4(1), 23-42. DOI: http://dx.doi.org/10.1515/applirev-2013-0002

Matthews, Jamie (2013, December): News Narratives of Terrorism: Assessing Source Diversity and Source
Use in UK News Coverage of Alleged Islamist Plots. Media, War & Conflict, 6(3), 295-310. DOI: http://
dx.doi.org/10.1177/1750635213505189

McEvoy, Kieran; Shirlow, Pete (2013): The Northern Ireland Peace Process and Terroristic Narratives: A
Reply to Edwards and McGrattan. Terrorism and Political Violence, 25(2), 161-166. DOI: http://dx.doi.org/10.
1080/09546553.2013.755419

Meleagrou-Hitchens, Alexander (2012): The Development of al-Qaedas Media Strategy and its Role in
Mobilizing Western Muslims. In: Lorry M. Fenner; Mark E. Stout; Jessica L. Goldings (Eds.): 9.11. Ten Years
Later: Insights on al-Qaedas Past & Future through Captured Records: Conference Proceedings. Washington,
DC: Johns Hopkins University Center for Advanced Governmental Studies, 169-185. URL: http://issuu.com/
johnshopkinsaap/docs/gov1220_ndu-final-issuu

Melnick, Michael (2007): Brand Terror: A Corporate Communication Perspective for Understanding
Terrorism. In: Boaz Ganor; Katharina von Knop; Carlos Duarte (Eds.): Hypermedia Seduction for Terrorist
Recruiting. (NATO Science for Peace and Security Series E: Human and Societal Dynamics, Vol. 25).
Amsterdam: IOS Press, 199-206. URL: http://cafe.themarker.com/nodes/r/290/236/file_0.pdf

Merola, Linda M. (2013, January): Transmitting the Threat: Media Coverage and the Discussion of Terrorism
and Civil Liberties since 9/11. Behavioral Sciences of Terrorism and Political Aggression, 5(1), 1-19. DOI:
http://dx.doi.org/10.1080/19434472.2011.571531

Merz, Fabien (2014, May): Adversarial Framing: President Bashar al-Assads Depiction of the Armed Syrian
Opposition. Journal of Terrorism Research, 5(2), 30-44. URL: http://ojs.st-andrews.ac.uk/index.php/jtr/article/
view/881

Michael, Lucy (2012): Frames, Forums and Facebook: Interpreting British Muslim Understandings of Post-
7/7 Militarist Media Narratives. In: Athina Karatzogianni (Ed.): Violence and War in Culture and the Media:
Five Disciplinary Lenses. (Media, War and Security). Abingdon: Routledge, 148-168. URL: http://www.
researchgate.net/publication/229822010_Frames_forums_and_Facebook_interpreting_British_Muslim_
understandings_of_post-77_militarist_media_narrative/file/9fcfd5137be1fc7462.pdf

Mullin, Corinna (2014): The Discourse on Political Islam and the War on Terror: Roots, Policy Implications
and Potential for Change. In: Daniela Pisoiu (Ed.): Arguing Counterterrorism: New Perspectives. (Critical
Terrorism Studies). Abingdon: Routledge, 221-246.

Nacos, Brigitte L. (2012): The Importance of Strategic Communication and Public Diplomacy in Combating
Terrorism. In: Kenan Tokgz (Ed.): Enhancing Cooperation in Defence against Terrorism. (NATO Science
for Peace and Security Series E: Human and Societal Dynamics, Vol. 99): Amsterdam: IOS Press, 127-138.

ISSN 2334-3745 130 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

DOI: http://dx.doi.org/10.3233/978-1-61499-103-8-127

Neumann, Peter R. (2013): Options and Strategies for Countering Online Radicalization in the United States.
Studies in Conflict & Terrorism, 36(6), 431-459. DOI: http://dx.doi.org/10.1080/1057610X.2013.784568
URL: http://counterideology2.files.wordpress.com/2013/06/options-n-strategies-for-countering-online-
radicalization-in-the-us.pdf

Nissen, Thomas Elkjer (2007, December): The Talibans Information Warfare: A Comparative Analysis of
NATO Information Operations (Info Ops) and Taliban Information Activities. (RDDC Brief). URL: http://
forsvaret.dk/fak/documents/fak/publikationer/the_talibans_information_warfare.pdf

nc, A. Aykut; Bucher, Troy; Ayta, Osman (2009): Introduction. In: A. Aykut nc; Troy Bucher; Osman
Ayta (Eds.): Strategic Communication for Combating Terrorism. [e-Book]. Ankara: Centre of Excellence
Defence Against Terrorism, 1-10. URL: http://www.tmmm.tsk.tr/publications/StratComm/StratComm2010.
pdf

Oualla, Bouchra (2012): YouTube Jihad: A Rhetorical Analysis of an Islamist Propaganda Video. In: Rdiger
Lohlker (Ed.): New Approaches to the Analysis of Jihadism: Online and Offline. (Studying Jihadism, Vol. 1).
Gttingen: V&R unipress, 141-152.

Oualla, Bouchra (2013): Strategies of Argumentation in the Propaganda of Jihad: The Analysis of a Jihadi
YouTube Video. In: Rdiger Lohlker (Ed.): Jihadism: Online Discourses and Representations. (Studying
Jihadism, Vol. 2). Gttingen: V&R unipress, 121-140.

Page, Michael; Challita, Lara; Harris, Alistair (2011): Al Qaeda in the Arabian Peninsula: Framing Narratives
and Prescriptions. Terrorism and Political Violence, 23(2), 150-172. DOI: http://dx.doi.org/10.1080/09546553.
2010.526039

Pamment, James (2014): Strategic Narratives in US Public Diplomacy: A Critical Geopolitics. Popular
Communication, 12(1), 48-64. DOI: http://dx.doi.org/10.1080/15405702.2013.868899

Paz, Reuven (2007, December): Reading their Lips: The Credibility of Jihadi Web Sites as Soft Power in
the War of the Minds. PRISM Occasional Papers, 5(5). URL: http://www.e-prism.org/images/PRISM_no_5_
vol_5_-_Reading_Their_Lips_-_Dec07.pdf

Pennebaker, James W. (2011): Using Computer Analyses to Identify Language Style and Aggressive Intent:
The Secret Life of Function Words. Dynamics of Asymmetric Conflict, 4(2), 92-102. DOI: http://dx.doi.org/10.
1080/17467586.2011.627932

Piscatori, James (2013): Winning Hearts and Minds: U.S. Promotion of a Democratic Islam. In: Shahram
Akbarzadeh et al. (Eds.): American Democracy Promotion in the Changing Middle East: From Bush to Obama.
(Durham Modern Middle East and Islamic World Series, Vol. 27). Abingdon: Routledge, 58-81.

Pisoiu, Daniela; Prucha, Nico (2014): When Terrorists Talk Back. In: Daniela Pisoiu (Ed.): Arguing
Counterterrorism: New Perspectives. (Critical Terrorism Studies). Abingdon: Routledge, 121-140.

Pisoiu, Daniela; Scheuing, David (2014): Introduction. In: Daniela Pisoiu (Ed.): Arguing Counterterrorism:
New Perspectives. (Critical Terrorism Studies). Abingdon: Routledge, 1-24.

Post, Jerrold M. (2007): The Key Role of Psychological Operations in Countering Terrorism. In: James J. F.
Forest (Ed.): Countering Terrorism and Insurgency in the 21st Century: International Perspectives. (Vol. 1:
Strategic and Tactical Considerations). Westport: Praeger Security International, 380-394.

ISSN 2334-3745 131 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Post, Jerrold M.; McGinnis, Cody; Moody, Kristen (2014, May-June): The Changing Face of Terrorism in the
21st Century: The Communications Revolution and the Virtual Community of Hatred. Behavioral Sciences &
the Law, 32(3), 306-334. DOI: http://dx.doi.org/10.1002/bsl.2123

Post, Jerrold M.; Pittas, Apostolos (2012): The Role of Strategic Information Operations in Countering
Terrorism. In: Updesh Kumar; Manas K. Mandal (Eds.): Countering Terrorism: Psychosocial Strategies. New
Delhi: SAGE, 385-407.

Prentice, Sheryl et al. (2011, March): Analyzing the Semantic Content and Persuasive Composition of
Extremist Media: A Case Study of Texts Produced during the Gaza Conflict. Information Systems Frontiers,
13(1), 61-73. DOI: http://dx.doi.org/10.1007/s10796-010-9272-y

Prentice, Sheryl et al. (2012, August): Differentiating Act from Ideology: Evidence from Messages for and
against Violent Extremism. Negotiation and Conflict Management Research, 5(3), 289-306. DOI: http://dx.doi.
org/10.1111/j.1750-4716.2012.00103.x

Price, Monroe E. (2013): Strategic Communication in Asymmetric Conflict. Dynamics of Asymmetric


Conflict, 6(1-3), 135-152. DOI: http://dx.doi.org/10.1080/17467586.2013.857422

Prucha, Nico (2013): Kangaroo Trials: Justice in the Name of God. In: Rdiger Lohlker (Ed.): Jihadism:
Online Discourses and Representations. (Studying Jihadism, Vol. 2). Gttingen: V&R unipress, 141-206.

Quiggin, Tom (2009, August): Understanding al-Qaedas Ideology for Counter-Narrative Work. Perspectives
on Terrorism, 3(2), 18-24. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/67

Rabasa, Angel (2011): Where Are We in the War of Ideas? In: Brian Michael Jenkins; John Paul Godges
(Eds.): The Long Shadow of 9/11: Americas Response to Terrorism. (RAND Monographs, MG-1107-RC).
[e-book]. Santa Monica: RAND Corporation, 61-70. URL: http://www.rand.org/pubs/monographs/MG1107.
html

Ramakrishna, Kumar (2011): Countering Al-Qaeda as a State of Mind. SEARCCTs Selection of Articles,
2/2011, 65-79. URL: http://www.searcct.gov.my/images/PDF_My/publication/searccts_selection_of_articles_
vol2.pdf

Ramsay, Gilbert (2012, March): Online Arguments against Al-Qaeda: An Exploratory Analysis. Perspectives
on Terrorism, 6(1), 54-69. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/ramsay-
online-arguments

Ramsay, Gilbert; Marsden, Sarah Victoria (2013): Radical Distinctions: A Comparative Study of Two Jihadist
Speeches. Critical Studies on Terrorism, 6(3), 392-409. DOI: http://dx.doi.org/10.1080/17539153.2013.847263

Ramswell, Prebble Q. (2014, April 30): The Utilization and Leveraging of Grievance as a Recruitment Tool
and Justification for Terroristic Acts Committed by Islamic Extremists. Small Wars Journal (April 2014).
URL: http://smallwarsjournal.com/jrnl/art/the-utilization-and-leveraging-of-grievance-as-a-recruitment-
tool-and-justification-for-ter

Rana, Muhammad Amir (2008, February): Counter-Ideology: Unanswered Questions and the Case of
Pakistan. Perspectives on Terrorism, 2(3), 3-5. URL: http://www.terrorismanalysts.com/pt/index.php/pot/
article/view/29

Reichwein, Alexander (2011): Ideologie und Auenpolitik: Die Neokonservativen und der 11. September.
In: Thomas Jger (Ed.): Die Welt nach 9/11: Auswirkungen des Terrorismus auf Staatenwelt und Gesellschaft.

ISSN 2334-3745 132 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

(Sonderheft der Zeitschrift fr Auen- und Sicherheitspolitik, 2/2011). Wiesbaden: VS Verlag fr


Sozialwissenschaften, 53-79. DOI: http://dx.doi.org/10.1007/978-3-531-94173-8_3

Renfer, Marc A.; Haas, Henriette S. (2008): Systematic Analysis in Counterterrorism: Messages on an Islamist
Internet Forum. International Journal of Intelligence and CounterIntelligence, 21(2), 314-336. DOI: http://
dx.doi.org/10.1080/08850600701854359

Renner, Judith; Spencer, Alexander (2013): De-Antagonising the Other: Changing Constructions of the
Taliban and the Possibility of Reconciliation. Global Society, 27(4), 475-496. DOI: http://dx.doi.org/10.1080/1
3600826.2013.823915

Richter, Carola (2007): Kommunikationsstrategien islamistischer Terroristen. In: Sonja Glaab (Ed.): Medien
und Terrorismus: Auf den Spuren einer symbiotischen Beziehung. (Wissenschaft & Sicherheit, Vol. 3). Berlin:
BWV Berliner Wissenschafts-Verlag, 75-81.

Robbins, James S. (2007): Battlefronts in the War of Ideas. In: James J. F. Forest (Ed.): Countering Terrorism
and Insurgency in the 21st Century: International Perspectives. (Vol. 1: Strategic and Tactical Considerations).
Westport: Praeger Security International, 298-318.

Roselle, Laura; Miskimmon, Alister; OLoughlin, Ben (2014, April): Strategic Narrative: A
New Means to Understand Soft Power. Media, War & Conflict, 7(1), 70-84. DOI: http://dx.doi.
org/10.1177/1750635213516696

Rosenau, William (2006): Waging the War of Ideas. In David G. Kamien (Ed.): The McGraw-Hill Homeland
Security Handbook: The Definitive Guide for Law Enforcement, EMT, and all other Security Professionals. New
York: McGraw-Hill, 1131-1148. URL: http://www.rand.org/pubs/reprints/RP1218.html

Ruggiero, Aino; Vos, Marita (2013, September): Terrorism Communication: Characteristics and Emerging
Perspectives in the Scientific Literature 20022011. Journal of Contingencies and Crisis Management, 21(3),
153-166. DOI: http://dx.doi.org/10.1111/1468-5973.12022

Said, Behnam (2012): Hymns (Nasheeds): A Contribution to the Study of the Jihadist Culture. Studies in
Conflict & Terrorism, 35(12), 863-879. DOI: http://dx.doi.org/10.1080/1057610X.2012.720242 URL: http://
counterideology2.files.wordpress.com/2012/11/hymns-nasheeds-a-contribution-to-the-study-of-the-jihadist-
culture.pdf

Salem, Arab; Reid, Edna; Chen, Hsinchun (2008): Multimedia Content Coding and Analysis: Unraveling
the Content of Jihadi Extremist Groups Videos. Studies in Conflict & Terrorism, 31(7), 605-626. DOI: http://
dx.doi.org/10.1080/10576100802144072 URL: http://floodhelp.uno.edu/uploads/Content%20Analysis/Salem.
pdf

Samuel, Thomas Koruth (2011): Understanding the Narrative of the Terrorist from the Perspective of the
Youth. In: Datin Paduka Rashidah Ramli (Ed.): Youth and Terrorism: A Selection of Articles. [e-Book]. Kuala
Lumpur: Southeast Asia Regional Centre for Counter-Terrorism (SEARCCT), 51-62. URL: http://www.
searcct.gov.my/images/PDF_My/publication/youth_and_terrorism.pdf

Samuel-Azran, Tal; Lavie-Dinur, Amit; Karniel, Yuval (2014, May): Narratives Used to Portray In-Group
Terrorists: A Comparative Analysis of the Israeli and Norwegian Press. Media, War & Conflict. Advance
Online Publication. DOI: http://dx.doi.org/10.1177/1750635214531106

Sanfilippo, Antonio; McGrath, Liam; Whitney, Paul (2011): Violent Frames in Action. Dynamics of

ISSN 2334-3745 133 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Asymmetric Conflict, 4(2), 103-112. DOI: http://dx.doi.org/10.1080/17467586.2011.627933

Sarangi, Sudhanshu; Canter, David (2009): The Rhetorical Foundation of Militant Jihad. In: David Canter
(Ed.): The Faces of Terrorism: Multidisciplinary Perspectives. Chichester: Wiley-Blackwell, 35-62. DOI: http://
dx.doi.org/10.1002/9780470744499.ch3 URL: http://eprints.hud.ac.uk/8042/

Schmid, Alex P. (2005): Terrorism as Psychological Warfare. Democracy and Security, 1(2), 137-146. DOI:
http://dx.doi.org/10.1080/17419160500322467

Schmidt, Wolf (2012): Sterben, um zu leben: Dschihad-Pop aus Deutschland. In: Jung, deutsch, Taliban.
Berlin: Ch. Links Verlag, 123-135.

Schulzke, Marcus (2013): The Virtual War on Terror: Counterterrorism Narratives in Video Games. New
Political Science, 35(4), 586-603. DOI: http://dx.doi.org/10.1080/07393148.2013.848703

Seib, Philip (2012): Public Diplomacy versus Terrorism. In: Des Freedman; Daya Kishan Thussu (Eds.):
Media and Terrorism: Global Perspectives. London: SAGE, 63-76.

Seib, Philip (2014, Winter): Public Diplomacy and Hard Power: The Challenges Facing NATO. The
Fletcher Forum of World Affairs, 38(1), 95-100. URL: http://www.fletcherforum.org/wp-content/
uploads/2014/04/38-1_Seib1.pdf

Seib, Philip; Janbek, Dana M. (2011): Targeting the Young. In: Global Terrorism and New Media: The Post-Al
Qaeda Generation. (Media, War and Security). Abingdon: Routledge, 61-74.

Sibianu, Daniela (2010): Islamist Propaganda on the Internet: Terrorist Entities Response to Al- leged Anti-
Muslim Western Actions. In: H.-L. Dienel et al. (Eds.): Terrorism and the Internet: Threats Target Groups
Deradicalisation Strategies. (NATO Science for Peace and Security Series E: Human and Societal Dynamics,
Vol. 67). Amsterdam: IOS Press, 81-89. DOI: http://dx.doi.org/10.3233/978-1-60750-537-2-81

Simons, Greg (2006, Fall): The Use of Rhetoric and the Mass Media in Russias War on Terror.
Demokratizatsiya, 14(4), 579-600. URL: http://api.ning.com/files/CBh6d69vms8DntF6aqo66z-f65b
KMTnTZLHwZGXf69GC75kYOeY9WwKdfrzOJS5hhiCwktb1RhVUteOyHVa8dmTXh88kRmfz/
SimonsDemokratizatsiya.pdf

Singh, Bilveer (2011): Youth Self-Radicalisation: Lessons from the Singapore Narrative. In: Datin Paduka
Rashidah Ramli (Ed.): Youth and Terrorism: A Selection of Articles. [e-Book]. Kuala Lumpur: Southeast Asia
Regional Centre for Counter-Terrorism (SEARCCT), 87-103. URL: http://www.searcct.gov.my/images/PDF_
My/publication/youth_and_terrorism.pdf

Smith, Allison G. (2011): The Relationship between Rhetoric and Terrorist Violence: Introduction to Special
Issue. Dynamics of Asymmetric Conflict, 4(2), 85-91. DOI: http://dx.doi.org/10.1080/17467586.2011.627931

Snow, Nancy (2009): The Resurgence of U.S. Public Diplomacy after 9/11. In: Matthew J. Morgan (Ed.): The
Impact of 9/11 on the Media, Arts, and Entertainment: The Day that Changed Everything? New York: Palgrave
Macmillan, 77-88. DOI: http://dx.doi.org/10.1057/9780230101616

Soueif, Ahdaf (2009): The Function of Narrative in the War on Terror. In: Chris Miller (Ed.): War on
Terror. (The Oxford Amnesty Lectures 2006). Manchester: Manchester University Press, 28-42. URL: http://
www.elac.ox.ac.uk/downloads/Rodin%20-%20In%20Miller,%20War%20on%20Terror.pdf

Spencer, Alexander (2013): Romantic Stories of the Pirate in IARRRH: The Failure of Linking Piracy and

ISSN 2334-3745 134 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Terrorism Narratives in Germany. International Studies Perspectives. Advance Online Publication. DOI:
http://dx.doi.org/10.1111/insp.12022

Staub, Ervin (2011): Changing Hearts and Minds: Information, Peace Education, Deradicalization, and
Public Education in Rwanda and the Congo. In: Overcoming Evil: Genocide, Violent Conflict, and Terrorism.
Oxford: Oxford University Press, 362-386.

Stevens, Tim (2009): Regulating the Dark Web: How a Two-Fold Approach can Tackle Peer-to-Peer
Radicalisation. The RUSI Journal, 154(2), 28-33. DOI: http://dx.doi.org/10.1080/03071840902965687

Stoica, Dragos (2014): Do Modern Radicals Believe in their Mythologies? A Comparison between the
Muslim Brotherhood and the Legion of the Archangel Michael in the Light of Four Political Mythologies.
Politics, Religion & Ideology, 15(1), 103-135. DOI: http://dx.doi.org/10.1080/21567689.2013.849584

Suedfeld, Peter; Brcic, Jelena (2011): Scoring Universal Values in the Study of Terrorist Groups and Leaders.
Dynamics of Asymmetric Conflict, 4(2), 166-174. DOI: http://dx.doi.org/10.1080/17467586.2011.627939

Sultan, Zulkifli Mohamed (2014, March): Takfir in Indonesia: Analysing the Ideology of Saiful Anam.
Counter Terrorist Trends and Analysis, 6(2), 18-23. URL: http://www.cttajournal.org/issues/CTTA-March14.
pdf

Stalan, Zeynep (2013): Terrorism, Media, and Public Information Management. In: Uur Grbz (Ed.):
Future Trends and New Approaches in Defeating the Terrorism Threat. (NATO Science for Peace and Security
Series E: Human and Societal Dynamics, Vol. 111). Amsterdam: IOS Press, 69-76. DOI: http://dx.doi.
org/10.3233/978-1-61499-272-1-69

Tanner, Rolf (2014, April-May): Narrative and Conflict in the Middle East. Survival, 56(2), 89-108. DOI:
http://dx.doi.org/10.1080/00396338.2014.901735

Tatham, Steve (2009): Understanding Strategic Communication: Towards a Definition. In: A. Aykut nc;
Troy Bucher; Osman Ayta (Eds.): Strategic Communication for Combating Terrorism. [e-Book]. Ankara:
Centre of Excellence Defence Against Terrorism, 15-35. URL: http://www.tmmm.tsk.tr/publications/
StratComm/StratComm2010.pdf

Thomas, Timothy L. (2007): Cyber Mobilization: The Neglected Aspect of Information Operations and
Counterinsurgency Doctrine. In: James J. F. Forest (Ed.): Countering Terrorism and Insurgency in the 21st
Century: International Perspectives. (Vol. 1: Strategic and Tactical Considerations). Westport: Praeger Security
International, 358-378.

Torres Soriano, Manuel R. (2007): Jihadist Propaganda and its Audiences: A Change of Course? Perspectives
on Terrorism, 1(2). URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/9/

Torres Soriano, Manuel R. (2011, July): The Evolution of the Discourse of Al-Qaeda in the Islamic Maghreb:
Themes, Countries and Individuals. Mediterranean Politics, 16(2), 279-298. DOI: http://dx.doi.org/10.1
080/13629395.2011.583747 URL: http://www.researchgate.net/publication/232846328_The_Evolution_
of_the_Discourse_of_Al-Qaeda_in_the_Islamic_Maghreb_Themes_Countries_and_Individuals/
file/72e7e528cd2d929d6e.pdf

Tsoukala, Anastassia (2014): Between Insurrection and Reformism: Public Discourses of Twenty-First
Century Greek Armed Groups. In: Daniela Pisoiu (Ed.): Arguing Counterterrorism: New Perspectives. (Critical
Terrorism Studies). Abingdon: Routledge, 95-120.

ISSN 2334-3745 135 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Tzanetti, Thalia (2007): Use of Media and Challenges in Countering Terrorist Rhetoric. In: Boaz Ganor;
Katharina von Knop; Carlos Duarte (Eds.): Hypermedia Seduction for Terrorist Recruiting. (NATO Science for
Peace and Security Series E: Human and Societal Dynamics, Vol. 25). Amsterdam: IOS Press, 231-241.

Ubayasiri, Kasun (2008): LTTE Narratives in Tamilnet: Independent Media or Tiger Proxy. Ejournalist, 8(2),
76-105. URL: http://ejournalist.com.au/v8n2/ubayasiri.pdf

United Nations Counterterrorism Implementation Task Force (CTITF) (2012, March): Use of the Internet
to Counter the Appeal of Extremist Violence: Conference Summary & Follow-up/Recommendations.
Perspectives on Terrorism, 6(1), 80-91. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/
view/CTITF-Use-of-Internet

Venkatraman, Amritha (2007): Religious Basis for Islamic Terrorism: The Quran and its Interpretations.
Studies in Conflict & Terrorism, 30(3), 229-248. DOI: http://dx.doi.org/10.1080/10576100600781612

Vergani, Matteo (2014): Neo-Jihadist Prosumers and Al Qaeda Single Narrative: The Case Study of
Giuliano Delnevo. Studies in Conflict & Terrorism, 37(7), 604-617. DOI: http://dx.doi.org/10.1080/105761
0X.2014.913122

Vladescu, Andrei (2010): Silent Jihad: Dissimulating Fundamentalist Messages in Promoting Islamic Values.
In: H.-L.Dienel et al. (Eds.): Terrorism and the Internet: Threats Target Groups Deradicalisation Strategies.
(NATO Science for Peace and Security Series E: Human and Societal Dynamics, Vol. 67). Amsterdam: IOS
Press, 61-70. DOI: http://dx.doi.org/10.3233/978-1-60750-537-2-61

von Knop, Katharina (2007): Countering Web-Based Islamist Narratives: Conceptualizing an Information
War and a Counter-Propaganda Campaign. In: Boaz Ganor; Katharina von Knop; Carlos Duarte (Eds.):
Hypermedia Seduction for Terrorist Recruiting. (NATO Science for Peace and Security Series E: Human and
Societal Dynamics, Vol. 25). Amsterdam: IOS Press, 245- 266.

Wagemakers, Joas (2011, December): Al-Qaidas Editor: Abu Jandal al-Azdis Online Jihadi Activism. Politics,
Religion & Ideology, 12(4), 355-369. DOI: http://dx.doi.org/10.1080/21567689.2011.624400

Wagemakers, Joas (2014): Contesting Religious Authority in Jordanian Salafi Networks. In: Marko Milosevic;
Kacper Rekawek (Eds.): Perseverance of Terrorism: Focus on Leaders. (NATO Science for Peace and Security
Series E: Human and Societal Dynamics, Vol. 117). Amsterdam: IOS Press, 111-125. DOI: http://dx.doi.
org/10.3233/978-1-61499-387-2-111

Walker, Stephen G. (2011): Anticipating Attacks from the Operational Codes of Terrorist Groups. Dynamics
of Asymmetric Conflict, 4(2), 135-143. DOI: http://dx.doi.org/10.1080/17467586.2011.627936

Weimann, Gabriel (2008, December): How Terrorists Use the Internet to Target Children. inSITE, 1(8), 14-
16.

Weimann, Gabriel (2009, January): Virtual Sisters: How Terrorists Target Women Online. inSITE, 2(1), 19-22.

Weimann, Gabriel (2011): Cyber-Fatwas and Terrorism. Studies in Conflict & Terrorism, 34(10), 765-781.
DOI: http://dx.doi.org/10.1080/1057610X.2011.604831

Weimann, Gabriel; von Knop, Katharina (2008): Applying the Notion of Noise to Countering
Online Terrorism. Studies in Conflict & Terrorism, 31(10), 883-902. DOI: http://dx.doi.
org/10.1080/10576100802342601

ISSN 2334-3745 136 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Werner, Andreas (2011): Von Manhattan nach Bagdad: Die Legitimation des Irakkrieges im Licht des 11.
Septembers. In: Thomas Jger (Ed.): Die Welt nach 9/11: Auswirkungen des Terrorismus auf Staatenwelt und
Gesellschaft. (Sonderheft der Zeitschrift fr Auen- und Sicherheitspolitik, 2/2011). Wiesbaden: VS Verlag
fr Sozialwissenschaften, 432-450. DOI: http://dx.doi.org/10.1007/978-3-531-94173-8_21

Wills, Deborah; Steuter, Erin (2014): The Hunter and the Hunted: Metaphors of Pursuit, Prey and the
Intractability of Difference in Post 9/11 American Counterterrorism Discourse. In: Daniela Pisoiu (Ed.):
Arguing Counterterrorism: New Perspectives. (Critical Terrorism Studies). Abingdon: Routledge, 270-291.

Winkler, Carol K. (2014): The Rhetorical Origins of the U.S. War on Terror. In: Daniela Pisoiu (Ed.): Arguing
Counterterrorism: New Perspectives. (Critical Terrorism Studies). Abingdon: Routledge, 27-55.

Winter, David G. (2011): Scoring Motive Imagery in Documents from Four Middle East Opposition Groups.
Dynamics of Asymmetric Conflict, 4(2), 144-154. DOI: http://dx.doi.org/10.1080/17467586.2011.627937

Yarchi, Moran (2014): Badtime Stories: The Frames of Terror Promoted by Political Actors. Democracy and
Security, 10(1), 22-51. DOI: http://dx.doi.org/10.1080/17419166.2013.842168

Yarchi, Moran et al. (2013, December): Promoting Stories about Terrorism to the International News
Media: A Study of Public Diplomacy. Media, War & Conflict, 6(3), 263-278. DOI: http://dx.doi.
org/10.1177/1750635213491179

Zalman, Amy (2009): Strategic Communications in Irregular Wars. In: A. Aykut nc; Troy Bucher; Osman
Ayta (Eds.): Strategic Communication for Combating Terrorism. [e-Book]. Ankara: Centre of Excellence
Defence Against Terrorism, 82-97. URL: http://www.tmmm.tsk.tr/publications/StratComm/StratComm2010.
pdf

Zarri, Gian Piero (2010): A Conceptual Methodology for Dealing with Terrorism Narratives. International
Journal of Digital Crime and Forensics, 2(2), 47-63. DOI: http://dx.doi.org/10.4018/jdcf.2010040104

Zeb, Fatima A. (2012, December): A Comparison of Narratives on the War on Terror. TIGAH, 2, 165-179.
URL: http://frc.com.pk/wp-content/uploads/2013/01/101.pdf

Zerubavel, Eviatar (2013): Historical Narratives and Collective Memory. In: Steven R. Corman (Ed.):
Narrating the Exit from Afghanistan. Tempe: Center for Strategic Communication, 99-116.

Grey Literature
Ali, Rashad; Stuart, Hannah (2014, February): A Guide to Refuting Jihadism: Critiquing Radical Islamist
Claims to Theological Authenticity. (Henry Jackson Society Report). URL: http://henryjacksonsociety.
org/2014/02/04/refuting-jihadism

Alonso, Rogelio (2010, July): Counter-Narratives against ETAs Terrorism in Spain. In: Eelco J. A. M. Kessels
(Ed.): Countering Violent Extremist Narratives. The Hague: National Coordinator for Counterterrorism
(NCTb), 20-35. URL: http://english.nctv.nl/Images/Countering%20Violent%20Extremist%20Narratives%20
-%202_tcm92-257208.pdf

Bakker, Edwin; Boer, Leen (2007, December): The Evolution of Al-Qaedaism: Ideology, Terrorists, and Appeal.
(Clingendael Institute Report). URL: http://www.clingendael.nl/publication/evolution-al-qaedaism-ideology-
terrorists-and-appeal

ISSN 2334-3745 137 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Bartolucci, Valentina; Corman, Steven R. (2014, April): The Narrative Landscape of al-Qaeda in the Islamic
Maghreb. (CSC Report No. 1401). URL: http://csc.asu.edu/2014/06/03/new-white-paper-the-narrative-
landscape-of-al-qaeda-in-the-islamic-maghreb

Benard, Cheryl (2011, September): The Mechanics of De-Legitimization. In: Laurie Fenstermacher; Todd
Leventhal (Eds.): Countering Violent Extremism: Scientific Methods & Strategies. Boston: NSI Inc., 106-110.
URL: http://nsiteam.com/scientist/wp-content/uploads/2014/02/U_Counter-Violent-Extremism-Final_
Approved-for-Public-Release_28Oct11v3.pdf

Berger, J. M.; Strathearn, Bill (2013, March): Who Matters Online: Measuring Influence, Evaluating Content
and Countering Violent Extremism in Online Social Networks. (ICSR Developments in Radicalisation
and Political Violence Series). URL: http://icsr.info/2013/03/who-matters-online-measuring-influence-
evaluating-content-and-countering-violent-extremism-in-online-social-networks

Blanchard, Christopher M. (2007, July): Al Qaeda: Statements and Evolving Ideology. (CRS Report for
Congress RL32759). URL: http://www.fas.org/sgp/crs/terror/RL32759.pdf

Bockstette, Carsten (2008, December): Jihadist Terrorist Use of Strategic Communication Management
Techniques. (The Marshall Center Occasional Paper Series, No. 20). URL: http://www.carlisle.army.mil/
DIME/documents/FRONTPOST%20Jihadist%20and%20SC1.pdf

Brachman, Jarret M.; Fishman, Brian; Felter, Joseph (2008, April): The Power of Truth? Questions for Ayman
al-Zawahiri. (CTC Report). URL: https://www.ctc.usma.edu/posts/the-power-of-truth

Brachman, Jarret M.; McCants, William F. (2006, February): Stealing Al-Qaidas Playbook. (CTC Report).
URL: https://www.ctc.usma.edu/posts/stealing-al-qaidas-playbook

Briggs, Rachel; Feve, Sebastien (2013): Review of Programs to Counter Narratives of Violent Extremism. (ISD
Report). URL: http://www.strategicdialogue.org/CounterNarrativesFN2011.pdf

Briggs, Rachel; Feve, Sebastien (2014): Inspire, Radicalize, Recruit: Countering the Appeal of Extremism
Online. (ISD Policy Briefing). URL: http://www.strategicdialogue.org/Inspire_Radicalize_Recruit.pdf

Briggs, Rachel; Frenett, Ross (2014): Foreign Fighters, the Challenge of Counter-Narratives. (ISD Policy
Briefing). URL: http://www.strategicdialogue.org/Foreign_Fighters_paper_for_website_v0.6.pdf

Bundesamt fr Verfassungsschutz (2010, December): Zerrbilder von Islam und Demokratie: Argumente gegen
extremistische Interpretationen von Islam und Demokratie. (ImFokus). URL: http://www.berlin.de/imperia/
md/content/seninn/verfassungsschutz/endfassung.pdf

Campbell, Stephen (2008): Muslim Public Opinion and Al Qaeda Propaganda: Implications for U.S. Policy.
(PDC Tufts Papers). URL: http://publicdiplomacycouncil.org/sites/default/files/users/Lisa%20Retterath/
Campbell_Muslim_Public_Opinion_and_Al_Qaeda_Propaganda_Implications_for_US_Policy.pdf

Carpenter, J. Scott et al. (2010, July): Fighting the Ideological Battle: The Missing Link in U.S. Strategy
to Counter Violent Extremism. (Washington Institute Strategic Reports, No. 4). URL: http://www.
washingtoninstitute.org/policy-analysis/view/fighting-the-ideological-battle-the-missing-link-in-u.s.-
strategy-to-counte

Corman, Steven R. (2011, September): Understanding the Role of Narrative in Extremist Strategic
Communication. In: Laurie Fenstermacher; Todd Leventhal (Eds.): Countering Violent Extremism:
Scientific Methods & Strategies. Boston: NSI Inc., 36-43. URL: http://nsiteam.com/scientist/wp-content/

ISSN 2334-3745 138 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

uploads/2014/02/U_Counter-Violent-Extremism-Final_Approved-for-Public-Release_28Oct11v3.pdf

Corman, Steven R.; Hess, Aaron; Justus, Z. S. (2006, June): Credibility in the Global War on Terrorism:
Strategic Principles and Research Agenda. (CSC Report #0603). URL: http://csc.asu.edu/2006/06/09/
credibility-in-the-global-war-on-terrorism

Corman, Steven R.; Schiefelbein, Jill S. (2006, April): Communication and Media Strategy in the Jihadi War of
Ideas. (CSC Report #0601). URL: http://csc.asu.edu/2006/04/20/communication-and-media-strategy-in-the-
jihadi-war-of-ideas

Corman, Steven R.; Trethewey, Angela; Goodall, H. L. (Bud), Jr. (2007, April): A 21st Century Model for
Communication in the Global War of Ideas: From Simplistic Influence to Pragmatic Complexity. (CSC Report
#0701). URL: http://csc.asu.edu/2007/04/03/a-21st-century-model-for-communication-in-the-global-war-of-
ideas

Dauber, Cori E. (2009, November): YouTube War: Fighting in a World of Cameras in Every Cell Phone and
Photoshop on Every Computer. (SSI Monograph). URL: http://www.strategicstudiesinstitute.army.mil/pubs/
display.cfm?pubID=951

Dauber, Cori E. (2012, January): The Importance of Images to Americas Fight against Violent Jihadism. (SSI
Article). URL: http://www.strategicstudiesinstitute.army.mil/index.cfm/articles/The-Importance-of-Images-
to-Americas-Fight-Against-Violent-Jihadism/2012/1/24

Dauber, Cori E. (2012, March): The Impact of Visual Images: Addendum. (SSI Article). URL: http://www.
strategicstudiesinstitute.army.mil/index.cfm/articles//The-Impact-of-Visual-Images-Addendum/2012/3/6

de Graaf, Beatrice (2010, July): Counter-Narratives and the Unintentional Messages Counterterrorism
Policies Unwittingly Produce: The Case of West-Germany. In: Eelco J. A. M. Kessels (Ed.): Countering Violent
Extremist Narratives. The Hague: National Coordinator for Counterterrorism (NCTb), 12-18. URL: http://
english.nctv.nl/Images/Countering%20Violent%20Extremist%20Narratives%20-%202_tcm92-257208.pdf

de Graaff, Bob (2010, July): Redefining Us and Them. In: Eelco J. A. M. Kessels (Ed.): Countering Violent
Extremist Narratives. The Hague: National Coordinator for Counterterrorism (NCTb), 36-45. URL: http://
english.nctv.nl/Images/Countering%20Violent%20Extremist%20Narratives%20-%202_tcm92-257208.pdf

Echevarria, Antulio J., II (2008, June): Wars of Ideas and the War of Ideas. (SSI Monograph). URL: http://
www.strategicstudiesinstitute.army.mil/pubs/display.cfm?pubID=866

FATA Research Centre (2014, March): Impact of War on Terror on Pashto Literature and Art. (Research
Study). URL: http://frc.com.pk/wp-content/uploads/2014/03/Research-Report-5-final-dated-March-21-2014.
pdf

Fighel, Jonathan (2009, December): The Saudi Double-Game: The Internet Counter-Radicalization Campaign
in Saudi Arabia. (ICT Articles). URL: http://www.ict.org.il/Article.aspx?ID=733

Fink, Naureen Chowdhury; Barclay, Jack (2013, February): Mastering the Narrative: Counterterrorism
Strategic Communication and the United Nations. (CGCC Report). URL: http://www.globalcenter.org/
publications/mastering-the-narrative-counterterrorism-strategic-communication-and-the-united-nations

Fink, Naureen Chowdhury; Karlekar, Karin Deutsch; Barakat, Rafia (2013, October): Mightier than the
Sword? The Role of the Media in Addressing Violence and Terrorism in South Asia. (CGCC Report). URL:
http://www.globalcenter.org/publications/mightier-than-the-sword-the-role-of-the-media-in-addressing-

ISSN 2334-3745 139 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

violence-and-terrorism-in-south-asia

Foxley, Tim (2007, June): The Talibans Propaganda Activities: How Well is the Afghan Insurgency
Communicating and What is it Saying? (SIPRI Project Paper). URL: www.sipri.org/research/conflict/
publications/foxley

Gregory, Bruce (2014, February): The Paradox of US Public Diplomacy: Its Rise and Demise. (IPDGC Special
Report #1). URL: http://www.gwu.edu/~ipdgc/news/gregory-resources/IPDGC-FinalReport.cfm

Gupta, Dipak K. (2011, September): Tracking the Spread of Violent Extremism. In: Laurie Fenstermacher;
Todd Leventhal (Eds.): Countering Violent Extremism: Scientific Methods & Strategies. Boston: NSI Inc., 44-
55. URL: http://nsiteam.com/scientist/wp-content/uploads/2014/02/U_Counter-Violent-Extremism-Final_
Approved-for-Public-Release_28Oct11v3.pdf

Halverson, Jeffry R. (2011, July): The Tariq ibn Ziyad Master Narrative. (CSC Report #1101). URL: http://csc.
asu.edu/2011/07/07/the-tariq-ibn-ziyad-master-narrative-2

Halverson, Jeffry R.; Furlow, R. Bennett; Corman, Steven R. (2012, July): How Islamist Extremists Quote the
Quran. (CSC Report No. 1202). URL: http://csc.asu.edu/wp-content/uploads/pdf/csc1202-quran-verses.pdf

Harchaoui, Sadik (2010, July): Heterogeneous Counter-Narratives and the Role of Social Diplomacy. In:
Eelco J. A. M. Kessels (Ed.): Countering Violent Extremist Narratives. The Hague: National Coordinator
for Counterterrorism (NCTb), 124-131. URL: http://english.nctv.nl/Images/Countering%20Violent%20
Extremist%20Narratives%20-%202_tcm92-257208.pdf

Helfstein, Scott; Abdullah, Nassir; alObaidi, Muhammad (2009, December): Deadly Vanguards: A Study of
al-Qaidas Violence against Muslims. (CTC Occasional Paper Series). URL: https://www.ctc.usma.edu/posts/
deadly-vanguards-a-study-of-al-qaidas-violence-against-muslims

Helmus, Todd C.; York, Erin; Chalk, Peter (2013): Promoting Online Voices for Countering Violent Extremism.
(RAND Research Reports, RR-130-OSD). URL: http://www.rand.org/pubs/research_reports/RR130.html

Hess, Aaron; Justus, Z. S. (2007, April): (Re)Defining the Long War: Toward a New Vocabulary of International
Terrorism. (CSC Report #0703). URL: http://csc.asu.edu/2007/04/25/redefining-the-long-war-toward-a-new-
vocabulary-of-international-terrorism

Huda, Qamar-ul (2011, September): Using Citizen Messengers to Counteract Radicalism. In: Laurie
Fenstermacher; Todd Leventhal (Eds.): Countering Violent Extremism: Scientific Methods & Strategies. Boston:
NSI Inc., 153-157. URL: http://nsiteam.com/scientist/wp-content/uploads/2014/02/U_Counter-Violent-
Extremism-Final_Approved-for-Public-Release_28Oct11v3.pdf

Hussain, Ghaffar; Saltman, Erin Marie (2014, May): Jihad Trending: A Comprehensive Analysis of Online
Extremism and How to Counter it. (Quilliam Report). URL: http://www.quilliamfoundation.org/wp/wp-
content/uploads/publications/free/jihad-trending-quilliam-report.pdf

Jacobson, Michael (2010, July): Learning Counter-Narrative Lessons from Cases of Terrorist Dropouts.
In: Eelco J. A. M. Kessels (Ed.): Countering Violent Extremist Narratives. The Hague: National Coordinator
for Counterterrorism (NCTb), 72-83. URL: http://english.nctv.nl/Images/Countering%20Violent%20
Extremist%20Narratives%20-%202_tcm92-257208.pdf

Justus, Z. S.; Hess, Aaron (2006, June): One Message for Many Audiences: Framing the Death of Abu Musab al-
Zarqawi. (CSC Report #0605). URL: http://csc.asu.edu/wp-content/uploads/pdf/115.pdf

ISSN 2334-3745 140 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Kamolnick, Paul (2014, June): Countering Radicalization and Recruitment to Al-Qaeda: Fighting the War
of Deeds. (SSI, The Letort Papers). URL: http://www.strategicstudiesinstitute.army.mil/pubs/display.
cfm?pubID=1205

Kesterson, Scott (2013, September): Market Economies and the Collision of Narratives: Approaching
Terrorism through Branding and Marketing Methodologies. In: Hriar Cabayan; Valerie Sitterle; Matt Yandura
(Eds.): Looking Back, Looking Forward: Perspectives on Terrorism and Responses to it. (SMA Occasional White
Paper). Boston: NSI Inc., 44-49. URL: http://nsiteam.com/scientist/wp-content/uploads/2014/02/U_SMA-
CT-White-Paper-Approved-for-Public-Release-19Sep13.pdf

Khan, Amil (2013, March): Pakistan and the Narratives of Extremism. (USIP Special Report 327). URL: http://
www.usip.org/publications/pakistan-and-the-narratives-of-extremism

Krause, Peter; Van Evera, Stephen (2009, September): Public Diplomacy: Ideas For the War of Ideas. (Belfer
Center Paper Series, Discussion Paper #09-10). URL: http://belfercenter.hks.harvard.edu/files/9.2009.
Public%20Diplomacy.Ideas%20for%20the%20War%20of%20Ideas.pdf

Kundnani, Arun (2012, June): Blind Spot? Security Narratives and Far-Right Violence in Europe. (ICCT
Research Paper). URL: http://www.icct.nl/publications/icct-papers/blind-spot-security-narratives-and-far-
right-violence-in-europe

Lahoud, Nelly; al-Ubaydi, Muhammad (2013, December): Jihadi Discourse in the Wake of the Arab Spring.
(CTC Report). URL: https://www.ctc.usma.edu/posts/jihadi-discourse-in-the-wake-of-the-arab-spring

Lahoud, Nelly et al. (2012, May): Letters from Abbottabad: Bin Ladin Sidelined? (CTC Report). URL: https://
www.ctc.usma.edu/posts/letters-from-abbottabad-bin-ladin-sidelined

Landau, Edan (2012, May): ...And Inspire The Believers. (ICT Articles). URL: http://www.ict.org.il/Articles/
tabid/66/Articlsid/1074/currentpage/1/Default.aspx

Landesamt fr Verfassungsschutz Berlin (2007, March): Audio- und Videobotschaften von al-Qaida 2006.
(Lageanalyse). URL: http://www.berlin.de/imperia/md/content/seninn/verfassungsschutz/lage_audio_
videobotschaften_2006.pdf?download.html

Landesamt fr Verfassungsschutz Berlin (2011, September): Vom Gangster-Rap zum Jihad-


Aufruf: Radikalisierende Hymnen neugeborener Salafisten. (Lageanalyse). URL: http://www.
berlin.de/imperia/md/content/seninn/verfassungsschutz/lageanalyse_salafistische_kampflieder_1.
pdf?start&ts=1331195967&file=lageanalyse_salafistische_kampflieder_1.pdf

Larson, Eric (2011, September): Exploiting Al-Qaidas Vulnerabilities for Delegitimization. In: Laurie
Fenstermacher; Todd Leventhal (Eds.): Countering Violent Extremism: Scientific Methods & Strategies. Boston:
NSI Inc., 111-124. URL: http://nsiteam.com/scientist/wp-content/uploads/2014/02/U_Counter-Violent-
Extremism-Final_Approved-for-Public-Release_28Oct11v3.pdf

Lemieux, Anthony; Nill, Robert (2011, September): The Role and Impact of Music in Promoting (and
Countering) Violent Extremism. In: Laurie Fenstermacher; Todd Leventhal (Eds.): Countering Violent
Extremism: Scientific Methods & Strategies. Boston: NSI Inc., 143-152. URL: http://nsiteam.com/scientist/wp-
content/uploads/2014/02/U_Counter-Violent-Extremism-Final_Approved-for-Public-Release_28Oct11v3.
pdf

Leuprecht, Christian et al. (2010, July): Narratives and Counter-Narratives for Global Jihad: Opinion versus

ISSN 2334-3745 141 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Action. In: Eelco J. A. M. Kessels (Ed.): Countering Violent Extremist Narratives. The Hague: National
Coordinator for Counterterrorism (NCTb), 58-71. URL: http://english.nctv.nl/Images/Countering%20
Violent%20Extremist%20Narratives%20-%202_tcm92-257208.pdf

Miskimmon, Alister; OLoughlin, Ben; Roselle, Laura (2012): Forging the World: Strategic Narratives
and International Relations. (Royal Holloway University of London et al. Working Paper). URL: http://
newpolcom.rhul.ac.uk/storage/Forging%20the%20World%20Working%20Paper%202012.pdf

National Coordinator for Security and Counterterrorism (NCTV) (2009, December): Ideology and Strategy
of Jihadism. (NCTV Report). URL: http://english.nctv.nl/Images/Ideologie%20en%20strategie%20van%20
het%20jihadisme%20def%20UK_tcm92-239750.pdf

Pak Institute for Peace Studies (PIPS) (2014, March): Creating an Environment that Counteracts Militant
Ideologies and Radicalism in Pakistan. (Occasional Publication). URL: http://www.peacebuilding.no/Regions/
Asia/Pakistan/Publications/Creating-an-environment-that-counteracts-militant-ideologies-and-radicalism-
in-Pakistan

Pizzuto, Michael (2013, May): Alter-Messaging: The Credible, Sustainable Counterterrorism Strategy. (CGCC
Policy Brief). URL: http://www.globalcenter.org/publications/alter-messaging-the-credible-sustainable-
counterterrorism-strategy/

Prucha, Nico; Fisher, Ali (2014, May 15): Death from Above: Jihadist Virtual Networks Respond to Drone
Strikes in Yemen. Jihadica. URL: http://www.jihadica.com/death-from-above-jihadist-virtual-networks-
respond-to-drone-strikes-in-yemen/

Qatar International Academy for Security Studies (QIASS); Soufan Group, The (2012, February): Countering
Violent Extremism: Community Engagement Programmes in Europe: Phase II: Volume I. URL: http://
soufangroup.com/countering-violent-extremism-community-engagement-programmes-in-europe/

Qatar International Academy for Security Studies (QIASS); Soufan Group, The (2013, January): Countering
Violent Extremism: Leveraging Terrorist Dropouts to Counter Violent Extremism in Southeast Asia: Phase II:
Volume II. URL: http://soufangroup.com/countering-violent-extremism-leveraging-terrorist-dropouts-to-
counter-violent-extremism-in-southeast-asia/

Qatar International Academy for Security Studies (QIASS); Soufan Group, The (2013, September):
Countering Violent Extremism: The Counter Narrative Study. New York: Authors. URL: http://soufangroup.
com/countering-violent-extremism-the-counter-narrative-study/

Quiggin, Tom (2010, July): Contemporary Jihadist Narratives: The Case of Momin Khawaja. In: Eelco
J. A. M. Kessels (Ed.): Countering Violent Extremist Narratives. The Hague: National Coordinator for
Counterterrorism (NCTb), 84-93. URL: http://english.nctv.nl/Images/Countering%20Violent%20
Extremist%20Narratives%20-%202_tcm92-257208.pdf

Qureshi, Toaha; Marsden, Sarah (2010, July): Furthering the Counter-Narrative via Educational and
Social Grassroots Projects. In: Eelco J. A. M. Kessels (Ed.): Countering Violent Extremist Narratives. The
Hague: National Coordinator for Counterterrorism (NCTb), 132-143. URL: http://english.nctv.nl/Images/
Countering%20Violent%20Extremist%20Narratives%20-%202_tcm92-257208.pdf

Readings, George; Brandon, James; Phelps, Richard (2011): Islamism and Language: How Using the Wrong
Words Reinforces Islamist Narratives. (Quilliam Concept Series, 3). URL: http://www.quilliamfoundation.org/
wp/wp-content/uploads/publications/free/islamism-and-language.pdf

ISSN 2334-3745 142 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Richardson, Roslyn (2013, December): Fighting Fire with Fire: Target Audience Responses to Online Anti-
Violence Campaigns. (ASPI Report). URL: https://www.aspi.org.au/publications/fighting-fire-with-fire-target-
audience-responses-to-online-anti-violence-campaigns/Fight_fire_long_paper_web.pdf

Rogan, Hanna (2005): THE_LONDON_BOMBINGS.COM: An Analysis of Jihadist Website Discussion


about the Attacks. (FFI/NOTAT-2005/02970). URL: http://www.ffi.no/no/Prosjekter/Terra/Publikasjoner/
Documents/FFI_Notat_Rogan_2005_02970.pdf

Savage, Sara; Liht, Jose (2013, September): Prevention of Violent Extremism Based on Promoting Value
Complexity, Informed by Neuroscience and Deployed on the Internet. In: Hriar Cabayan; Valerie Sitterle;
Matt Yandura (Eds.): Looking Back, Looking Forward: Perspectives on Terrorism and Responses to it. (SMA
Occasional White Paper). Boston: NSI, Inc., 69-83. URL: http://nsiteam.com/scientist/wp-content/
uploads/2014/02/U_SMA-CT-White-Paper-Approved-for-Public-Release-19Sep13.pdf

Schmid, Alex P. (2010, July): The Importance of Countering Al-Qaedas Single Narrative. In: Eelco
J. A. M. Kessels (Ed.): Countering Violent Extremist Narratives. The Hague: National Coordinator for
Counterterrorism (NCTb), 46-57. URL: http://english.nctv.nl/Images/Countering%20Violent%20
Extremist%20Narratives%20-%202_tcm92-257208.pdf

Schmid, Alex P. (2014, January): Al-Qaedas Single Narrative and Attempts to Develop Counter-Narratives:
The State of Knowledge. (ICCT Research Paper). URL: http://www.icct.nl/publications/icct-papers/al-qaedas-
single-narrative-and-attempts-to-develop-counter-narratives

Seib, Philip (2011, March): Public Diplomacy, New Media, and Counterterrorism. (CPD Perspectives on Public
Diplomacy, Paper 2, 2011). URL: http://uscpublicdiplomacy.org/publications/perspectives/CPDPerspectives_
P2_2011.pdf

Shaikh, Mubin (2013, September): Mechanics of the Toolbox: CVE Practice and Inform & Influence
Activities. In: Hriar Cabayan; Valerie Sitterle; Matt Yandura (Eds.): Looking Back, Looking Forward:
Perspectives on Terrorism and Responses to it. (SMA Occasional White Paper). Boston: NSI Inc., 114-122.
URL: http://nsiteam.com/scientist/wp-content/uploads/2014/02/U_SMA-CT-White-Paper-Approved-for-
Public-Release-19Sep13.pdf

Simons, Gregory (2006, January): The Use of Rhetoric and the Mass Media in Russias War on Terror.
(Department of Eurasian Studies, Uppsala University Working Papers, No. 98). URL: http://uu.diva-portal.
org/smash/get/diva2:131143/FULLTEXT01.pdf

Speckhard, Anne (2011, September): Battling the University of Jihad: An Evidence-Based Ideological
Program to Counter Militant Jihadi Groups Active on the Internet. In: Laurie Fenstermacher; Todd Leventhal
(Eds.): Countering Violent Extremism: Scientific Methods & Strategies. Boston: NSI Inc., 164-174. URL: http://
nsiteam.com/scientist/wp-content/uploads/2014/02/U_Counter-Violent-Extremism-Final_Approved-for-
Public-Release_28Oct11v3.pdf

Stevens, Tim (2010, July): New Media and Counter-Narrative Strategies. In: Eelco J. A. M. Kessels (Ed.):
Countering Violent Extremist Narratives. The Hague: National Coordinator for Counterterrorism (NCTb),
112-123. URL: http://english.nctv.nl/Images/Countering%20Violent%20Extremist%20Narratives%20-%202_
tcm92-257208.pdf

Stevens, Tim; Neumann, Peter R. (2009, January): Countering Online Radicalisation: A Strategy for Action.
(ICSR Policy Report). URL: http://icsr.info/2010/03/the-challenge-of-online-radicalisation-a-strategy-for-

ISSN 2334-3745 143 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

action

Suedfeld, Peter; Cross, Ryan W.; Logan, Carson (2013, September): Can Thematic Content Analysis Separate
the Pyramid of Ideas from the Pyramid of Action? A Comparison among Different Degrees of Commitment
to Violence. In: Hriar Cabayan; Valerie Sitterle; Matt Yandura (Eds.): Looking Back, Looking Forward:
Perspectives on Terrorism and Responses to it. (SMA Occasional White Paper). Boston: NSI, Inc., 61-68. URL:
http://nsiteam.com/scientist/wp-content/uploads/2014/02/U_SMA-CT-White-Paper-Approved-for-Public-
Release-19Sep13.pdf

Taylor, Max; Ramsay, Gilbert (2010, July): Violent Radical Content and the Relationship between Ideology
and Behaviour: Do Counter-Narratives Matter? In: Eelco J. A. M. Kessels (Ed.): Countering Violent Extremist
Narratives. The Hague: National Coordinator for Counterterrorism (NCTb), 94-111. URL: http://english.
nctv.nl/Images/Countering%20Violent%20Extremist%20Narratives%20-%202_tcm92-257208.pdf

Thuv, Aasmund (2014, January): An Essay on Strategic Communication, Information Operations and Public
Affairs. (FFI-rapport 2013/02227). URL: http://rapporter.ffi.no/rapporter/2013/02227.pdf

Tinnes, Judith (2012, March): Premiere oder Wiederauffhrung? Ein Vergleich der
Kommunikationsstrategien von RAF und Al-Qaida. URL: http://www.teachingterror.com/wp/wp-content/
uploads/2014/05/Tinnes_RAF.pdf

Trethewey, Angela; Corman, Steven R.; Goodall, H. L. (Bud), Jr. (2009, September): Out of their Heads and
into their Conversation: Countering Extremist Ideology. (CSC Report #0902). URL: http://csc.asu.edu/wp-
content/uploads/pdf/123.pdf

Washington Institute for Near East Policy, Presidential Task Force on Confronting the Ideology of Radical
Extremism (2009, March): Rewriting the Narrative: An Integrated Strategy for Counterradicalization.
(Presidential Study Group Reports). URL: https://www.washingtoninstitute.org/policy-analysis/view/
rewriting-the-narrative-an-integrated-strategy-for-counterradicalization

Wilkinson, Benedict; Barclay, Jack (2011, December): The Language of Jihad: Narratives and Strategies of Al-
Qaida in the Arabian Peninsula and UK Responses. (RUSI Whitehall Report 4-11). URL: https://www.rusi.
org/publications/whitehallreports/ref:N4F06F4FDD26D6/

Woodward, Mark et al. (2012, September): Hate Speech and the Indonesian Islamic Defenders Front. (CSC
Report No. 1203). URL: http://csc.asu.edu/2012/09/06/hate-speech-and-the-indonesian-islamic-defenders-
front

Note
Whenever retrievable, URLs for freely available versions of subscription-based publications have been
provided. Thanks to the Open Access movement, self-archiving of publications in institutional repositories or
on author homepages for free public use (so-called Green Open Access) has become more common. Please
note, that the content of Green Open Access documents is not necessarily identical to the officially published
versions (e.g., in case of pre-prints); it might therefore not have passed through all editorial stages publishers
employ to ensure quality control (peer review, copy and layout editing etc.). In some cases, articles may only
be cited after getting consent by the author(s).

About the compiler: Judith Tinnes, Ph.D., studied Information Science and New German Literature and Lin-

ISSN 2334-3745 144 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

guistics at the Saarland University (Germany). Her doctoral thesis dealt with Internet usage of Islamist terror-
ists and insurgents. Currently she works in the research & development department of the Leibniz Institute for
Psychology Information (ZPID). She also serves as Editorial Assistant for Perspectives on Terrorism.

ISSN 2334-3745 145 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Bibliography on State Sponsored Terrorism and Assassinations Abroad; with


Special Emphasis on the Assassination of 28 July 1914 that Triggered World
War I
[BSPTEP -2014-4]
Selected and compiled by Eric Price

NB: some of the items listed below are clickable and allow access to the full text; those with an asterix [*] only
have a clickable table of contents/only more information.

Aichelburg, W. (1999). Sarajevo: das Attentat 28. Juni 1914: das Attentat auf Erzherzog Franz Ferdinand
von Osterreich-Este in Bilddokumenten [in German] Wien: Verlag Osterreich [*http://primocat.bl.uk/
F/?func=direct&local_base=PRIMO&doc_number=012583737&format=001&con_lng=prm]

Almira, J. & Stojan, Z. (1927). Le dclic de Sarajevo [in French]. Paris: Editions Radot

[*http://primocat.bl.uk/F/?func=direct&local_base=PRIMO&doc_number=000060553&format=001&con_
lng=prm]

Bertin, C. (1971). Lucheni. Sarajevo [in French ] Paris: F. Beauval.

Belfield, R. (2011) A Brief History of Hitmen and Assassinations London: Constable & Robinson, Ltd. [*http://
www.amazon.co.uk/Brief-History-Hitmen-Assassinations-Histories/dp/1849015201]

Butcher, T. (2014). The Trigger. London: Chatto & Windus [*http://www.randomhouse.co.uk/editions/the-


trigger/9780701187934]

Campbell, I. (2010) The plot to kill Graziani: the attempted assassination of Mussolinis Viceroy. Addis
Ababa: Addis Ababa, University Press [*http://primocat.bl.uk/F/?func=direct&local_base=PRIMO&doc_
number=015984836&format=001&con_lng=prm]

Cassels, L. (1984). The Archduke and the Assassin: Sarajevo, June 28th 1914. New York: Stein and Day. [*http://
www.amazon.com/The-Archduke-Assassin-Sarajevo-June/dp/0812830210]

Clark, C.M. (2013) The Sleepwalkers: How Europe Went to War in 1914. New York: Harper [*http://lccn.loc.
gov/2012515665]

Dedijer, V. (1966) Road to Sarajevo. New York: Simon and Schuster [*http://www.unz.org/Pub/
DedijerVladimir-1966]

Doak, R. S. (2009). Assassination at Sarajevo: the spark that started World War I. Minneapolis, Minn.:
Compass Point Books [*http://lccn.loc.gov/2008007545]

Fabijancic, T. (2009). Bosnia: In the Footsteps of Gavrilo Princip. Edmonton: University of Alberta Press
[*http://www.amazon.com/Bosnia-Footsteps-Gavrillo-Princip-Wayfarer/dp/0888645198]

Feuerlicht, R. S. (1968). The Desperate Act: the Assassination of Franz Ferdinand at Sarajevo New York:
McGraw-Hill [*http://www.amazon.com/The-Archduke-Assassin-Sarajevo-June/dp/0812830210]

Fromkin, D. (2004) Europes Last Summer: Who Started the Great War in 1914? New York: Knopf: Distributed

ISSN 2334-3745 146 Month 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

by Random House. [*http://catdir.loc.gov/catdir/toc/ecip0412/2003027391.html]

Henig, R.B. (2002). The Origins of the First World War. London; New York: Routledge [*https://www.worldcat.
org/title/origins-of-the-first-world-war/oclc/47658947&referer=brief_results]

Hyams, E. (1969) Killing No Murder A Study of Assassination as Political Means London: Thomas Nelson
and Sons, Ltd. [*https://www.ncjrs.gov/App/Publications/abstract.aspx?ID=62566]

Ibrahim, R. (1981) (Ed.) The Example of Bala Mohammed: His Life, His Commitment, His Assassination
Kano, Nigeria: [The Committee]. [*http://primocat.bl.uk/F/?func=direct&local_base=PRIMO&doc_
number=010011043&format=001&con_lng=prm]

Islam, M. (1971) Bangabandhu hatyara dalila [in Bengali]. Dhaka: Bangabandhu Bamladesa Gabeshana-
Prakalpera Pakshe Sucayana Prakasana. [*http://primocat.bl.uk/F/?func=direct&local_base=PRIMO&doc_
number=009976603&format=001&con_lng=prm]

Jannen, W. (1996). The Lions of July: Prelude to War, 1914. Novato, CA: Presidio [*http://lccn.loc.
gov/2012049777]

Jevdjevic, D. (2002). Sarajevski zaverenici [in Serbian]. Belgrade: Familet [*http://www.amazon.com/


SARAJEVSKI-ZAVERENICI-Vidovdan-DOBROSLAV-JEVDjEVIC/dp/B004HBQP9I]

Khumri, M. & Chakravarty, P. (Eds.) (2007). Assassinations That Altered the Course of the World.
Mumbai : Magna Pub. Co. [*http://primocat.bl.uk/F/?func=direct&local_base=PRIMO&doc_
number=015428946&format=001&con_lng=prm]

King, G. & Woolmans, S. (2013). The Assassination of the Archduke: Sarajevo, 1914, and the Romance that
Changed the World. New York, N.Y.: St. Martins Press [*http://lccn.loc.gov/2013013949]

Ljubibratic, D. (1959). Gavrilo Princip [in Serbian]. Beograd: Nolit

Malcolm, N. (1994). Bosnia: A Short History. New York: New York University Press. [*http://www.
independent.co.uk/arts-entertainment/book-reviewfundamentally-unholy-wars-bosnia-a-short-history
noel-malcolm-macmillan-1750-1428917.html]

Marovi, M. (2001). Atentat u Moskvi [in Serbian] Podgorica: Medeon [*http://primocat.bl.uk/


F/?func=direct&local_base=PRIMO&doc_number=013546678&format=001&con_lng=prm]

McMeekin, S. (2013). July 1914: Countdown to War. New York: Basic Books [*http://lccn.loc.gov/2012049777]

Mousset, A. (1930). Princip, Gavrilo, 1894-1918, defendant [in French]. Paris: Payot

Otte, T. (2014) July Crisis: The Worlds Descent into War, Summer 1914. Cambridge: University
Press [*https://www.worldcat.org/title/july-crisis-the-worlds-descent-into-war-summer-1914/
oclc/881165550&referer=brief_results]

Pace, M. (2009). Mino Pecorelli: il delitto irrisolto [in Italian]. Roma: A. Curcio [*http://primocat.bl.uk/
F/?func=direct&local_base=PRIMO&doc_number=015422842&format=001&con_lng=prm]

Palji, D.D. (2004). Ubistvo kralja Aleksandra I u Marseju 1934: La tragedie du 9 octobre [in
Serbian]. Kruevac: A. Stoi [*http://primocat.bl.uk/F/?func=direct&local_base=PRIMO&doc_
number=013507221&format=001&con_lng=prm]

ISSN 2334-3745 147 Month 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Pappenheim, M. (1926). Gavrilo Princips Bekenntnisse: ein geschichtlicher Beitrag zur Vorgeschichte des
Attentates von Sarajevo [in German]. Wien: Lechner & Son. [*http://biblio.co.uk/book/gavrilo-princips-
bekenntnisse-geschichtlicher-beitrag-vorgeschichte/d/264443783]

Pincher, C. (1985). The Secret Offensive: Active Measures: A Saga of Deception, Disinformation,
Subversion, Terrorism, Sabotage and Assassination. London: Sidgwick & Jackson [*http://primocat.bl.uk/
F/?func=direct&local_base=PRIMO&doc_number=008736301&format=001&con_lng=prm]

Princips, G. (1926). Gavrilo Princips Bekenntnisse: Ein geschichtlicher Beitrag zur Vorgeschichte des Attentates
von Sarajevo [in German]. Wien: Lechner [*http://primocat.bl.uk/F/?func=direct&local_base=PRIMO&doc_
number=009594521&format=001&con_lng=prm]

Roider, K. (2005). Princip, Gavrilo (18941918); in: Tucker, S. C. &; Roberts, P.(Eds.). The Encyclopedia of
World War I : A Political, Social, and Military History Santa Barbara, California: ABC-CLIO. [*http://corp.
credoreference.com/component/booktracker/edition/1429.html]

Rolland, R. (Ed.) (2007). Mahatma Gandhi: the leader of the universal peace & liberty : covering the
events in Gandhis life until his assassination in 1948. Delhi, India: Vijay Goel [*http://primocat.bl.uk/
F/?func=direct&local_base=PRIMO&doc_number=014098866&format=001&con_lng=prm]

Service, R. (2009). Trotsky: a biography. Cambridge, Mass.: Belknap Press of Harvard University Press
[*https://www.worldcat.org/title/trotsky-a-biography/oclc/319493419&referer=brief_results]

Smith, D.J. (2008). One Morning in Sarajevo: 28 June 1914. London: Weidenfeld & Nicolson [*http://
primocat.bl.uk/F/?func=direct&local_base=PRIMO&doc_number=014566499&format=001&con_lng=prm]

Tabachnyk, D.T. (2010). Vbyvstvo Petliury [in Ukrainian]. Kharkiv: Folio [*http://primocat.bl.uk/
F/?func=direct&local_base=PRIMO&doc_number=015805672&format=001&con_lng=prm]

Time-Life Books (Ed.) (2004). Assassination. London: Time-Life [*http://primocat.bl.uk/


F/?func=direct&local_base=PRIMO&doc_number=012946893&format=001&con_lng=prm]

Villiers, P. (2010). Gavrilo Princip: The Assassin Who Started the First World War. Oxford: Fawler Press
[*http://www.amazon.co.uk/Gavrilo-Princip-Assassin-started-First/dp/075244977X]

Williams, H. (2008). Days That Changed the World: The Defining Moments of World History. London: Quercus
[*https://www.worldcat.org/title/days-that-changed-the-world-the-defining-moments-of-world-history/
oclc/264693687&referer=brief_results]

Woolf, A. (2003). Assassination in Sarajevo, June 28, 1914. Austin, Tex.: Raintree Steck-Vaughn [*http://lccn.
loc.gov/2003001960]

Zellner, H.M (Ed.) (1974). Assassination. Rochester, VT.: Schenckman [*http://primocat.bl.uk/


F/?func=direct&local_base=PRIMO&doc_number=014020061&format=001&con_lng=prm]

Non-conventional Literature
Al-Arian, A. A-A. (2011). Heeding the call: Popular Islamic activism in Egypt (19701981) [thesis].
Georgetown University [https://repository.library.georgetown.edu/handle/10822/558074]

Anon. (n.d.) A Study of Assassination . [http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB4/ciaguat2.html]

ISSN 2334-3745 148 Month 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Barnes, H.E. (n.d.). Did Germany Incite Austria in 1914? Smith College [http://net.lib.byu.edu/estu/wwi/
PDFs/Germany%20Incite%20Austria.pdf]

Bartley, C.M. (2004). Al Qaedas Nests of Evil: The Threat of State Sponsored Terrorism. University of Reading.
[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1510806]

Becker, M. T. (2005). Rethinking state responsibility for terrorism: Reflections on the principles of attribution
and causation in international law after 9/11 [thesis]. Columbia University [*http://phdtree.org/
pdf/25542257-rethinking-state-responsibility-for-terrorism-reflections-on-the-principles-of-attribution-and-
causation-in-international-law-after-911/]

Bohlande, M. ( 2009). Killing Many to Save a Few? Preliminary Thoughts about Avoiding Collateral Civilian
Damage by Assassination of Regime Elites. Durham University [http://papers.ssrn.com/sol3/papers.
cfm?abstract_id=1592837]

Doyle, K. & Kornbluh, P. (Eds.) (1997). CIA and Assassinations. The Guatemala 1954 Documents. National
Security Archive Electronic Briefing Book No. 4 [*http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB4/]

Dreidemy, L. (2012). Denn ein Engel kann nicht sterben. Engelbert Dollfu 1934 2012 [in German] [thesis].
University of Vienna [*http://othes.univie.ac.at/28615/]

Drury, A. C. & Mohn, J. & Moore, M. (2011). Sanctions and State Sponsored Terrorism. University of
Missouri at Columbia; APSA 2011 Annual Meeting Paper [http://papers.ssrn.com/sol3/papers.cfm?abstract_
id=1900554]

Dvorak, A. L. (2003) Rendezvous with death: The assassination of President Kennedy and the question
of conspiracy [thesis]. Illinois State University [*http://www.researchgate.net/publication/35944953_
Rendezvous_with_death__the_assassination_of_President_Kennedy_and_the_question_of_conspiracy_]

Fein, R.A. & Vossekuil, B. ( 1997). Preventing Assassination: Secret Service Exceptional Case Study Project. US
Dept. of Justice, Washington, DC. [*https://www.ncjrs.gov/app/publications/abstract.aspx?ID=167224]

Frey, B.S. (2007). Why Kill Politicians? A Rational Choice Analysis of Political Assassinations. CREMA;
Zeppelin University [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=990275]

Frey, B.S. & Torgle, B. (2008) Politicians: Be Killed or Survive. CESifo Working Paper Series No. 2483. [http://
papers.ssrn.com/sol3/papers.cfm?abstract_id=1313020]

Isakiewicz, M. (2012). State-sponsored Terrorism - an Effective Tool of Conducting International Relations?


The Implications of Soviet Support for International Terrorism [thesis]. West Virginia University. [http://
phdtree.org/pdf/23428485-state-sponsored-terrorism-an-effective-tool-of-conducting-international-
relations-the-implications-of-soviet-support-for-international-terror/]

Jaeger, D.A. & Paserman, M.D. (2007). The Shape of Things to Come? Assessing the Effectiveness of Suicide
Attacks and Targeted Killings. Hebrew IZA Discussion Paper No. 2890, University of Jerusalem [http://papers.
ssrn.com/sol3/papers.cfm?abstract_id=1000138]

Jefferis, J. (2009) Sacred protest: Towards an understanding of religiously motivated political violence [thesis].
Boston University [*http://www.bu.edu/phpbin/calendar/event.php?id=34972&cid=17]

Jones, B.J. & Olken, B.A. (2007) Hit or Miss? The Effect of Assassinations on Institutions and War.
Northwestern University; NBER Working Paper No. w13102 [http://papers.ssrn.com/sol3/papers.

ISSN 2334-3745 149 Month 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

cfm?abstract_id=986952]

Karl, R. A. (2009). State formation, violence, and Cold War in Colombia, 1957-1966 [thesis].
Harvard University [*http://phdtree.org/pdf/25469277-state-formation-violence-and-cold-war-in-
colombia-1957-1966/]

Kunicki, M. S. (2004). The Polish crusader: The life and politics of Boleslaw Piasecki, 19151979 [thesis].
Stanford University. [*http://searchworks.stanford.edu/view/5708384]

Leiter, U. (2010). Gesichter des Terrors [Faces of Terror; in German] [thesis]. University of Vienna [http://
othes.univie.ac.at/8582/].

McFayden Jr. E, (2009). Global Implications of State Sponsored Terrorism. Kentucky State University. [http://
papers.ssrn.com/sol3/papers.cfm?abstract_id=1528198]

Mehler, A. (2008). Breaking the Insecurity Trap? How Violence and Counter-Violence are Perpetuated in Elite
Power Struggles. German Institute of Global and Area Studies; GIGA Working Paper No. 87 [http://papers.
ssrn.com/sol3/papers.cfm?abstract_id=1288067]

Merritt, S. E. (2000). The Great Purges in the Soviet Far East, 19371938 [thesis]. University of California,
Riverside [*http://phdtree.org/pdf/25273265-the-great-purges-in-the-soviet-far-east-1937-1938/].

Nielsen, C. A. (2002). One state, one nation, one king: The dictatorship of King Aleksandar and his Yugoslav
project, 19291935 [thesis]. Columbia University [http://getebook.org/?p=83147]

Russo, M. C. (2007). The Chechen Revolution and the Future of Instability in the Caucasus [thesis]. University
of Pittsburgh.[http://d-scholarship.pitt.edu/7740/1/Russo_Thesis_GSPIA_final.pdf]

Schaeffer, C. M. (2010). State sponsorship of terrorism: A comparison of Cubas and Irans use of terrorism
to export ideological revolutions [thesis]. George Mason University [*http://digilib.gmu.edu/dspace/
handle/1920/6410]

Solomon, A. (2011). By Means of the Gun: African States after Assassination [thesis]. George Washington
University. [*http://gradworks.umi.com/14/96/1496652.html]

Turits, R. L. (1997). The foundations of despotism: Peasants, property, and the Trujillo regime (1930-1961)
[thesis]. University of Chicago [http://phdtree.org/pdf/25115673-the-foundations-of-despotism-peasants-
property-and-the-trujillo-regime-1930-1961/]

Wightman, J. A. (2003). Assassination as a Tool of United States Foreign Policy [thesis]. Carleton University,
Canada. [http://curve.carleton.ca/system/files/theses/26751.pdf]

Prime Journal Articles


Adhikari, B. & Mathe, S. B. The Global Media, the Probe Commission and the Assassination of Nepals
Royal Family: Questions Unasked and Unanswered. Himalayan Research Bulletin 21 (1) 2001,pp. 46-66.
[http://digitalcommons.macalester.edu/cgi/viewcontent.cgi?article=1678&context=himalaya]

Ahram, A. I. Role of State-Sponsored Militias in Genocide Terrorism and Political Violence 26 (3, July), 2014,
pp. 488-503.[*http://www.ingentaconnect.com/content/routledg/tpv/2014/00000026/00000003/art00005]

Bachmann, S-D.V.O. Targeted Killing as a Means of Asymmetric Warfare: A Provocative View and Invitation

ISSN 2334-3745 150 Month 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

to Debate. Law, Crime & History, 1 (5) 2011, pp. 9-15. [http://papers.ssrn.com/sol3/papers.cfm?abstract_
id=1844168]

Ben-Yehuda, H. & Levin-Banchik, L. Regime and Power in International Terror Crises: Strong Democracies
Fight Back Hard. Terrorism and Political Violence 26 (3, July) 2014, pp. 504-522 [*http://www.ingentaconnect.
com/content/routledg/tpv/2014/00000026/00000003/art00006]

Carter, B.E. State-Supported Terrorism and the U.S. Courts: Some Foreign Policy Problems. American Society
of International Law Proceedings 2002, pp. 251-254. [http://papers.ssrn.com/sol3/papers.cfm?abstract_
id=2309536]

Devoss, D. Searching for Gavrilo Princip In Sarajevo today, few traces remain of the young Serbian
revolutionary whose two pistol shots touched off World War I. Smithsonian 31 (5) 2000, pp. 42-53.

Ditrych, O. International terrorism in the League of Nations and the contemporary terrorism dispositive.
Critical Studies on Terrorism 6 (2, August) 2013, pp. 225-240. [*http://www.tandfonline.com/doi/
abs/10.1080/17539153.2013.764103#preview]

Eichensehr, K.. On the Offensive Assassination Policy Under International Law. Harvard International Review
25 (3) 2003, pp. 36-39.

Fein, R.A. & Vossekuil, B.. Assassination in the United Nations: an Operational Study of Recent
Assassinations, Attacks and Near-Lethal Approaches. Journal of Forensic Sciences Sciences, 44 (2, March)
1999, pp. 247-456. [http://www.secretservice.gov/ntac/ntac_jfs.pdf]

Fitzpatrick, J.. Speaking Law to Power: The War Against Terrorism and Human Rights. European Journal of
International Law 14 (2) 2003, pp. 241-264. [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1160498]

Gal-Or, N. State-Sponsored Terrorism: A Mode of Diplomacy? Conflict Quarterly 13 (3) 1993, pp. 7-23
[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2238833]

Govern, K.H. & Schlager, S.A. Guns for Hire, Death on Demand: The Permissibility of U.S. Outsourcing of
Drone Attacks to Civilian Surrogates of the Armed Forces and Challenges to Traditional Just War Theory.
Florida Journal of International Law XXV (2) 2013, pp. 147-206. [http://papers.ssrn.com/sol3/papers.
cfm?abstract_id=2341756].

Jackson N. M. War on the Enemy: Self-Defence and State-Sponsored Terrorism. Melbourne Journal of
International Law, 4 (2) 2003, pp. 406-438. [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=901219]

Jackson, P. Union or Death!: Gavrilo Princip, Young Bosnia and the Role of Sacred Time in the Dynamics
of Nationalist Terrorism. Totalitarian Movements and Political Religions, 7 (1) 2006, pp. 45-65. [http://www.
scribd.com/doc/104377196/Jackson-2006-Union-or-Death-Gavrilo-Princip-Young-Bosnia-and-the-Role-of-
Sacred-Time-in-the-Dynamics-of-Nationalist-Terrorism]

Jensen, R. The United States, International Policing and the War against Anarchist Terrorism, 1900-1914.
Terrorism and Political Violence, 13 (1) 2003, pp. 15-46. [http://www.diplomatie.gouv.fr/fr/IMG/pdf/US_
luttecontreterrorism.pdf]

Jensen, R. B. The Pre-1914 Anarchist Lone Wolf Terrorist and Governmental Responses.
Terrorism and Political Violence 26 (1) 2014, pp. 86-94. [*http://www.tandfonline.com/doi/
abs/10.1080/09546553.2014.849919#preview]

ISSN 2334-3745 151 Month 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Johnson, T.H. Taliban adaptations and innovations. Small Wars & Insurgencies 24 (1, March) 2013, pp. 3-27.
[*http://www.tandfonline.com/doi/abs/10.1080/09592318.2013.740228#.U7vOrKGKAy8]

Lombardo, R.M. The Black Hand: a study in Moral Panic. Global Crime 6 (3-4, August) 2006, pp. 267-284.
[*hwww.tandfonline.com/doi/abs/10.1080/17440570500273366#preview]

McDonnell, T.M. Sow What You Reap? Using Predator and Reaper Drones to Carry Out Assassinations or
Targeted Killings of Suspected Islamic Terrorists. George Washington International Law Review 44 (2)2012,
pp. 243-316 [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2162192]

Ortega-Cowan, R. Et Tu, Qusay? A Functional Neoclassic Response to an Assassination-averse Ideology.


Mediterranean Journal of Human Rights 9 (1) 2005, pp. 283-318

Ovetz, R. The Infernal Machine: A History of Terrorism from the Assassination of Tsar Alexander II to Al-
Qaeda. Critical Sociology 33 (5/6) 2007, pp. 981-984 [*http://www.citeulike.org/article/1836634]

Pinfari, M. Exploring the Terrorist Nature of Political Assassinations: A Reinterpretation of the Orsini
Attentat. Terrorism and Political 21 (4, September), 2009, pp. 580-594 [*http://www.tandfonline.com/doi/
abs/10.1080/09546550903153308#preview]

Soto-Prez-de-Celis, E. The Death of Leon Trotsky Neurosurgery 67 (2, August) 2010, pp. 417423. [*http://
journals.lww.com/neurosurgery/Abstract/2010/08000/The-Death-of-Leon-Trotsky.33.aspx]

See also resources on the Internet:


The Assassination of Archduke Franz Ferdinand http://net.lib.byu.edu/~rdh7/wwi/comment/sarajevo.html

Assassinations, List of Wikipedia http://en.wikipedia.org/wiki/List_of_assassinations

The Black Hand Movement History Learning http://www.historylearningsite.co.uk/black_hand_movement.


htm

Gavrilo Princip, a participant in the assassination of Archduke Franz Ferdinand The British Library /
Martin Pappenheim http://www.bl.uk/collection-items/gavrilo-princip

The hearing of Gavrilo Princip / The Sarajevo Trail 12 October 1914 http://www.ucis.pitt.edu/eehistory/
H200Readings/Topic6-R3.html

Origins and outbreak The British Library/ David Stevenson http://www.bl.uk/world-war-one/articles/


origins-and-outbreak

Prison Interview with Gavrilo Princip after the Assassination https://libcom.org/history/did-teenage-


anarchists-trigger-world-war-one-what-was-politics-assassins-franz-ferdinand

State Sponsors of Terrorism Overview/ U.S. Department of State http://www.state.gov/j/ct/rls/


crt/2013/224826.htm

About the Compiler: Eric Price is a professional information specialist who worked for the International
Atomic Energy Agency (IAEA) in Vienna and, upon retirement, joined Perspectives on Terrorism as an Editorial
Assistant.

ISSN 2334-3745 152 Month 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

IV. Book Reviews

John Horgan, The Psychology of Terrorism [Revised and updated second edition].
New York, NY: Routledge: 2014. 184 pages, US$170.00 [Hardcover], ISBN: 978-0-
415-69800-9; US$42.95 [Paperback], ISBN: 978-0-415-69802-3.
Reviewed by Jeff Victoroff

Less than a decade ago, to read the entire unclassified English language literature on the psychology
of terrorism was entirely doable. Now its not. So what should one read? John Horgans new book is an
authentically excellent point of departure.

First, two disclaimers: I am a biologist in spirit. Biology explains the mechanisms and ultimate causes
of animal behavior. In contrast, psychology focuses on emergent abstractions such as happiness or
internalization. Candidly, notions such as fundamental attribution error are interesting to talk about, but
it is not immediately apparent how they will help Bostonians keep their legs. Still, a disciplinary framework
may be unimportant. As Hippocrates said, what works is good. The discipline of psychology has indeed
offered many ideas that prove valuable for enhancing human security. Second, I like John Horgan. We share a
ferocious devotion to empiricism. Entirely apart from his exceptional capacity for clear thinking and writing,
I think hes a great guy who truly wants to figure out the truth.

Prof. Horgan is a senior scholar in the field of psychology, and Director of the Center for Terrorism and
Security Studies at the University of Massachusetts Lowell. His new book, The Psychology of Terrorism,
is a revised and expanded second edition. It is better than the first (published in 2005), and, leaping to a
recommendation, deserves sharp attention from both scholars and practitioners (a term that describes
a loose conglomerate of leaders, policy makers, diplomats, police, war fighters, and hard working spooks).
Horgan mostly confines his attention to substate group terrorism, even stating it is clear that terrorism is a
group process (p. 105). This leaves out some pieces of the pie, but is a sensible focus for a short book.

The author declares his priorities up front. He distinguishes between dated efforts to understand the terrorist
mind and recent efforts to uncover exploitable facts about the psychosocial development, engagement, and
disengagement of people attracted to the terrorist lifestyle. What Horgan derogates as the mentalist strain
of terrorism studies refers to the main goal of earlier scholarship. There was a decades-long quest to answer
the question what makes terrorists psychologically different? It is entirely possible that someday empirical
research will make progress in answering that questionnot by identifying a profile of the typical terrorist,
but simply by identifying psychological or cognitive traits that are statistically more prevalent among
terrorists than among matched non-terrorists with similar backgrounds. For instance, perhaps someday high
quality studies will show that a need for cognitive closure is observed more frequently among adolescents
who go on to become terrorists compared with those who dont.

But what would such studies yield, beyond discussions at the Defense Advanced Research Projects Agency
(DARPA)? Like philosophy, such studies would be fun, but what profit is gained toward the interests of
national security? Dr. Horgan is interested in meaningful results. He clearly cares about whether advances in
psychological knowledge might save lives: ...a real urgency is upon us now to develop a straightforward and
unambiguous understanding of the process whereby individuals and groups turn to terrorism, and . . . how
policy makers might employ that knowledge in the development of counterterrorism initiatives(p. 77).

The first 76 pages of this 184-page book comprise a critical review of earlier research on the psychology of

ISSN 2334-3745 153 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

terrorism. This bare-bones introduction is surely among the most compact and useful of such overviews; it
will help beginners appreciate the awkward fits and starts of these early studies. Experts will need to hang
in there until later in the text, when Horgan begins to fulfill his promise of discussing recent, meaningful
advances. The author emphasizes several points that distinguish his approach from that of others. First, it is
very important to acknowledge dissimilarity/heterogeneity. Empirical evidence tends to debunk any single
model of why people get involved with terrorism. For example, recent research by Dyer and Simcox (2013)
suggested five different categories of involvement among 171 al-Qaeda members. Second, the poorly defined
term radicalizationthe focus of much attention after 2005may be a red herring. The danger comes not
necessarily from radicals, but from terrorists. For instance, People for the Ethical Treatment of Animals
arguably stake out radical positions, but they do not typically use violence. The Animal Liberation Front,
in contrast, commits acts of terror. Which group should we study and counteract? Horgan suggests that
excessive attention to radicalization, which is just a part of the spectrum of opinion that challenges the status
quo, distracts from the life-saving work of reducing terrorism.

Third, Horgan strongly emphasizes his distinction between involvement in terrorism as a state and
involvement as a processa progression of lots of little steps toward affiliation with a terrorist movement,
pursued for any number of reasons, to play any number of roles, but in part to attain status. Fourth, he
states that so-called root causes of terrorism are not root causes. Social injustice, for example, may be a
precondition for the emergence of terrorism, but it hardly determines that result. Indeed, there is far more
social injustice in the world than terrorism. Fifth, Horgan agrees that very few people exposed to conflict
become terrorists. This is the indisputable fact that suggests, contrary to those who deny it, that terrorists
are indeed different. But that hardly means all of them are different in the same way or to the same degree.
Horgan characterizes the tiny subset who become involved as exhibiting the nonspecific quality he calls
openness to engagement. In the absence of empirical data suggesting a common trait, his amorphous
concept of openness to engagement is about as good as it gets in defining the mysterious and diverse
combinations of innate, developmental, and social factors that explain why widely varying individuals get
involved.

Overall, Horgan urges us to set aside the why of terrorism studies and devote more attention to the how,
since knowing how terrorism emerges seems more likely to empower life-saving security responses. His book
is densely supplied with excellent examples of how plots evolve from contemplation through execution,
offering some startling insights into a potpourri of banal pragmatics (what do I say when I want to rent a
farm to practice blowing things up?) and elaborate logistics (how many months of surveillance will prepare
us to plant the photo-electric cell such that only the targets car triggers it?) that characterize past attacks. He
strongly emphasizes that the search for a terrorist profile or inner mental risk factors is fruitless, whereas the
search for the behaviors associated with terrorism is promising: identifying the behaviors associated with . .
. becoming involved, being... involved, and engaging in terrorist events and disengaging. (p 159) This focus
verges on the Skinnerian objection to psychodynamics: it is to never mind where the box came from (and
never mind about the gears in the box), just look at what goes in and pops outwhich Horgan calls the
behaviors themselves and the ways in which they develop. I am a little more open to the possible value of
why research. Its clearly useful to know that an internal combustion engine turns gas into rotary motion,
but it might be equally useful to know why such engine exists: the human eagerness for superhuman power.

On occasion, Horgan detours into disciplinary over-reckoning. Only an academic psychologist (or Federal
prosecutor) would state, a clear answer to the question of what it means to be involved in terrorism is
perhaps one of the most important research questions since 2001 (p. 104). That is not a research question.
No yardstick, clinical trial, or mathematical formula will answer it. It is a semanticor, as Horgan correctly

ISSN 2334-3745 154 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

says, definitionalissue that will be argued long after the closing of the Guantanamo Bay detention facility.

Perhaps paradoxically, one of the most courageous and insightful contributions of this excellent text is
to point out our failures as a scholarly community. One such failure is the sorry dearth of high quality
datacombined with both our failure to share data (often due to academic competition or restrictions on
government-based research grants) and our failure to understand what the data reveal about the how of
terrorism.

Even more importantly, in his last chapter Horgan finally tackles the elephant in the room: the psychology
of counterterrorism. The author boldly proposes that we can no longer shy away from analyzing how many
counterterrorists have interfered with, rather than advanced, the very cause they claim to champion. Never
mind the assumedly rational design of counterterrorism policy or initiatives based on falsifiable theory. We
are not even accomplishing trial-and-error, thus policy choices are not informed by deep study of costs versus
benefits of what we do (for instance, targeted killing). Do we know how many people have turned to militant
jihad because of drones? Without having made a serious effort to answer such a question, buzzing around
Yemen in crop-dusters with Hellfires is a foolhardy invitation to blowback.

Why do we continue to act in a vacuum of outcomes-based research? A psychological examination of


involvement in counterterrorism exposes the embarrassing gaffes of both practitioners and scholars.
First, we face a gargantuan structural issue: leaders, policymakers, politicians, law enforcement, military,
and intelligence agencies are responsible for counterterrorism. Absent solid knowledge, and subject to
political whims, they may be dubiously qualified to select the best counterterrorism approach, and are often
compromised by pursuit of personal agendas. Compare this with the way we fight cancer, where doctors and
researchers collaborate extensively, and information derived from clinical trials are shared widely. Surely, a
complex, life threatening world problem like terrorism deserves a post-enlightenment approach involving
unbiased study of what works and what doesnt. The prioritization of counterterrorism initiatives should at
least be influence by those who employ evidence-based and outcomes-based approaches. Yet, despite a lot of
research funding and a lot of communication between researchers and policymakers, the policymakers tend
to nod and shake hands with the expertsand then follow their gut instincts.

Second, academics are hardly immune from bias. Scholars of terrorism (myself included) believe in their
hearts that the world would be safer if only leaders followed their advice. Maybe one of them is right, but the
very idea is presumptuous given the pitiable paucity of outcomes-based research.

The bottom line: no one knows how to do counterterrorism better because (a) the right research has not been
done and (b) even if unbiased scholars figured out what seems to work, practitionersdisabled by cognitive
bias and personal agendasmay not listen. Horgan admits that this might seem depressing, but his candor
is uplifting. Its high time to expose and overcome the structural, political, and psychological underpinnings
of our continued homeland insecurity. Ultimately, the conclusion of this excellent book is a dignified call for
new thinking on terrorism and how to counter it with increasing sophistication and success.

About the Reviewer: Dr. Jeff Victoroff is Associate Professor of Clinical Neurology and Psychiatry, University of
Southern California.

ISSN 2334-3745 155 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Andrew Silke (Ed.), Prisons, Terrorism and Extremism: Critical Issues in


Management, Radicalisation and Reform. New York, NY: Routledge, 2014.
312 pages, US$ 150 .00 [Hardcover], US$ 45.95 [Paperback], ISBN-13: 978-
0415810371.
Reviewed by Jacqueline Bates-Gaston

This edited volume is a timely and much needed response to the interests of policy makers, government
officials, academics and research students in building knowledge and understanding of current international
developments in the management and treatment of those convicted and imprisoned for offences that relate
to violence in a nationalist, ideological or religious context. The focus of the contributors to this volume
is on those who advocate the use of violence to promote extreme political/religious views against specific
victims in order to influence future political directions or intentions. It critically examines the importance of
the meanings and definitions of words that we now use every daylike terrorism, extremism, radicalisation,
de-radicalisation and disengagement. Andrew Silke, the volumes editor, makes the point that, although most
of those who are convicted of politically motivated offences are incarcerated, our current understanding of
terrorists and extremists in prisons is limited while general research into terrorist-related activities after 9/11
has greatly increased. This book helps address the deficits in our knowledge on developments that occur
during their incarceration.

While the book has five parts, the themes interlink and comparisons and learning across the international
spectrum and different cultural contexts are evident. The scene is set with a discussion by Colin Murray
on critical issues regarding prisons and a perspective on the imprisonment strategy taken within the UK.
The potential processes of prison radicalisation in the United States are examined in Joshua Sinais chapters
innovative research into the development of a seven phase model which outlines the elements involved. This
model has connections with extremist risk assessment factors discussed later in the book. Another chapter,
by Liran Goldman, reviews experiences of US prison radicalisation with perspectives on the process, the
relevance of violent gang culture and reference to Prislam or jailhouse Islam, religion and the potential
impact of leadership role models, in particular, with insecure and needy prisoners. The author suggests that
prison may only set the foundation for radicalisation and that post prison experiences of unmet reintegration
support needs are equally important. This point is taken up again later in the book.

The chapter by Marisa Porges analyses the underlying psychological processes and implications of the
counselling/communicative aspects and possible consequences, of state led de-radicalisation tactics in the
Yemen and Saudi Arabia. The fine, psychological balance between persuasion and resistance to change are
explored. The successes and challenges of these communicative approaches to de-radicalisation in similar
and other cultural prison contexts are revisited in later chapters in the volume including the chapter by
Christopher Dean on individual and group work in the UK, National Offender Management, and Healthy
Identity Intervention. Within the de-radicalisation debate a further chapter by John F. Morrison explains
the importance of IRA prisoners in the evolution and politicisation of the movement in Ireland towards the
ballot box rather than the bullet, with the emphasis on the long journey towards a peace process.

The point is made that even in countries where there have been no formal de-radicalisation approaches, re-
offending rates for terrorist offenders have been remarkably low compared to other types of offending. The
controversial and contested area of risk assessment of violent extremist prisoners is thoroughly addressed
in two chapters with comprehensive explorations of the factors which contribute to risk in this context.
Silke observes that, following extensive literature reviews relating to terrorism, there is agreement and some

ISSN 2334-3745 156 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

overlap of risk factors in two recent developments, the NOMS, Extremism Risk Guidance (ERG22+, 22
factors +where relevant) and the Violent Extremism Risk Assessment protocol (VERA 2, with 31 items)
including beliefs and attitudes, context and intent, history and capability, commitment and motivation in
both the tools with additional protective factors in the latter. The chapter by D. Elaine Pressman and John
Flockton on VERA 2 provides extensive detail about the development, research, theoretical underpinning
and applications of the tool. The authors have addressed the need for an offence-specific, utilitarian and
relevant risk assessment tool which is now being trialled in various jurisdictions. As further research
is required, neither of these risk assessment protocols claims to predict future risk of re-offending in a
terrorist context but do offer a well researched, structured, clinical judgement approach to assessment. These
assessments have developed a comprehensive and systematic approach to considering a range of dynamic
factors known through research, to be associated with violent terrorist behaviours. Such an approach is
extremely valuable to law enforcement and risk management agencies that require defensible and practical
mechanisms.

Using interviews with eighteen leaders of the most active and audacious terrorist groups in Israel Hamas,
Fatah and Islamic Jihad the unique security prisoner experiences in Israeli prisons is provided in the
chapter by Sagit Yehoshua. The management of prisoners in this jurisdiction is influenced by the size of the
population and collective resistance demonstrated by Palestinians who construct a whole new community
inside the prisons, under a new social space, through the concepts of identity and collectivism, into fully
formalised institutions which influences the life and identity of the prisoners as well as Palestinian society.
(p. 145) Potential radicalisation and de-radicalisation pathways are discussed through examination of the
roles of education, leadership opportunities and length of time spent in prison. Parallels are drawn with
paramilitary prisoners in Northern Ireland as described in other chapters in the book.

Using key case studies, the volume also draws on expert research and experiences of radicalisation and
de-radicalisation from different contexts across the world (England, Saudi Arabia, Sri Lanka, Singapore,
Indonesia, Germany and Spain) to explore critical issues which are important to professional practice and to
the individual offenders human rights, to prison management policies and interventions, rehabilitation and
impact on recidivism.

Finally, the chapter by Neil Ferguson looks at the post release experiences and influence of those convicted
of terrorist related offences in England, Wales and Northern Ireland. The messages underline the importance
of increasing the attention and investment in rehabilitation programmes at post release stages while not
ignoring the lessons learned in Northern Ireland on the impact that prisoners can have on future peace
processes. The strength of the edited volume is that it draws on current research, experiences and practice
across international boundaries using different approaches and sources. It highlights the variety of different,
experimental and sometimes contradictory approaches that have been tried to manage and intervene with
violent terrorist offenders from a wide spectrum of cultures and contexts.

It is recognised that further evaluations and research into the various rehabilitative and assessment
approaches are needed. However, given the dire situations in Israel and Palestine and other countries today,
the book offers current, expert research and experience into what might work in some contexts which can
inform all those interested in a safer global society.

About the Reviewer: Dr. Jacqueline Bates-Gaston, a Chartered and Registered Forensic Psychologist, is
Chief Psychologist, The Northern Ireland Prison Service.

ISSN 2334-3745 157 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Counterterrorism Bookshelf :
47 Books on Terrorism & Counter-terrorism Related Subjects
by Joshua Sinai

This column consists of two parts: capsule reviews of six books published by various publishers, and,
continuing the series begun in previous columns, highlighting books by publishers with significant
publishing programs in terrorism & counterterrorism studies, providing this time capsule reviews (with
the authors listed in alphabetical order) of 41 books published by Routledge. Please note that while most of
these books were recently published, several published over the past few years deserving attention were also
included.

Note: Future columns will review books by publishers such as Palgrave Macmillan, Springer, Stanford University
Press, and the University of Chicago Press.

General Reviews
Yael S. Aronoff, The Political Psychology of Israeli Prime Ministers: When Hard Liners Opt for Peace. New
York, NY: Cambridge University Press, 2014. 248 pp., US $ 29.99 [Paperback], ISBN: 9781107669802.

In this highly interesting and innovative account of the political psychology of six Israeli Prime Ministers,
the author draws on the academic literature on the psychology of political conversion to examine how such
political leaders approached, whether through conciliation or intransigence, the conflict between Israel and
the Palestinians. Based on the books six case studies of Yitzhak Shamir, Benjamin Netanyahu, Ariel Sharon,
Yitzhak Rabin, Ehud Barak, and Shimon Peres, the author finds that those who rejected full-blown peace
processes tended to be those leaders who are emotionally attached to and focus on a violent conflict-ridden
pastbecause they are less able to forge a new image of a past opponent as a partner, while risk tolerant
leaders are more likely to make peace. (p. xvi). A highly useful conceptual framework in the form of a matrix
is provided to examine the ideology and cognitive style of such political leaders regarding their propensity to
engage in potential peace processes. This is broken down into factors such as their adherence to a particular
ideology, cognitive flexibility, risk propensity, emotional intelligence, and whether their advisers expressed
diverse views. This book is a valuable contribution to the literature on counterterrorism with its focus on the
challenges involved in resolving terrorism-related conflicts. The author is a professor in Israel studies and
international relations at Michigan State University.

Robert J. Bunker and John P. Sullivan (Eds.). Crime Wars and Narco Terrorism in the Americas: A Small
Wars Journal El Centro Anthology. Bloomington, IN: iUniverse LLC, 2014. 544 pp., US $ 31.95 [Paperback],
ISBN: 978-1491739556.

The contributors to this important anthology examine the magnitude of threats presented by the evolution of
narco-trafficking criminality, and corruption at all levels of the Mexican state into a full-scale narco-terrorist
insurgency that threatens the security of the Mexican state, and has seen its violence spill over into its United
States neighbor. The volumes chapters cover topics such as a framework for analyzing criminal national
security threats, a review of Mexicos counter drug policy and related security measures, the possible benefits
of creating a paramilitary force in Mexico to counter such threats, the spillover of Mexican criminal violence
into Americas border states, armed tactics employed by the drug cartels, the involvement of the Anonymous
hacktivist group in targeting the Los Zetas drug cartel, an assessment of the American defense departments
military measures against such transnational organized crime, the relevance of Colombias counter-drug

ISSN 2334-3745 158 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

and counterinsurgency campaigns to the Mexican area of operations, and future trends in Latin American
narco-criminality and terrorist warfare. The anthologys chapters were originally published in the Small Wars
Journal. Dr. Bunker is adjunct faculty, Division of Politics and Economics, Claremont Graduate University
and a Senior Fellow with Small Wars Journal-El Centro, and Dr. Sullivan is a career police officer in Los
Angeles and a Senior Fellow with Small Wars Journal-El Centro.

Frank Foley, Countering Terrorism in Britain and France: Institutions, Norms and the Shadow of the Past. New
York, NY: Cambridge University Press, 2013. 352 pages, US $ 99.00 [Hardcover], ISBN: 9781107029699.

A highly detailed and authoritative account of the similarities and differences in the way the liberal
democracies of Britain and France conduct counterterrorist policies and operations against their respective
adversaries. The books chapters cover topics such as the nature of the Islamist-based terrorist threats facing
France and Britain, the history and evolution of their counterterrorist organizations, how both countries
coordinate intelligence, police and prosecution in their counterterrorism responses, how they manage the
judicial frameworks for prosecuting suspected terrorists, and how both countries tackle Islamist terrorism
and its supporting communities. One of the authors conclusions, based on his analysis of the British
and French cases, is that if [liberal democratic] norms and institutions play a crucial role in shaping
counterterrorist policy, then states in certain circumstances are constrained from making an overly repressive
response to terrorism. (p. 327) The author is a research fellow at the Centre for Political and Constitutional
Studies in Madrid and a Visiting Research Fellow in the Department of War Studies at Kings College
London.

Jeff M. Moore, The Thai Way of Counterinsurgency. Charleston, SC: A Muir Analytics Book, 2014. 476 pp.,
US $ 18.00 [Paperback] ISBN: 978-149395701.

This is a highly comprehensive and insightful account of Thailands counterinsurgency (COIN) campaigns
strategies, operations, and tactics from 1965 to the current period. Beginning with a valuable theoretical
discussion of the differences between terrorism and guerrilla insurgencies, the author proceeds to discuss
the components of effective counterinsurgency, which he terms the COIN Pantheon because not only
does it involve force applications based on quality intelligence, but also lasting social and economic
programs, counterpolitical warfare, political remedies for the disenfranchised, and government acceptance
of previously ignored cultural realities. (p.xiv) Based on these crucial criteria, the author finds that the Thai
way of COIN is generally effective in several areas, such as in the security, political and economic realms,
with the government military forces often achieving the upper hand. (p. 372) In other areas, however, the
author writes that the Thai way of COIN is also, unfortunately, self-hindering due to turf battles, rivalries,
corruption, and egos. (p. 372) The author is director of Muir Analytics, LLC, which advises clients in
reducing exposure to risks in conflict areas.

Andrew Silke, Terrorism: All That Matters. London, UK: Hodder & Stoughton Ltd/New York, NY: McGraw-
Hill, 2014. 160 pp., US $ 14.00 [Paperback], ISBN: 978-1444163315.

This is a concise, highly engaging and authoritative introductory overview of terrorism in all its dimensions,
starting with a history of terrorism, how to define terrorism, terrorists motivations, strategies and tactics,
the root causes of terrorism, the nature of terrorists mindsets, how individuals become radicalized into
terrorism, the characteristics of suicide terrorism, the components of effective counterterrorism, and future
trends in terrorism. Although intended as a quick read, this well-written book nevertheless is filled with
numerous insights. It discusses the 1st century Sicarii as well as 19th century Russian anarchists to illustrate
the history and evolution of terrorism. In assessing the effectiveness of terrorist warfare, the author points

ISSN 2334-3745 159 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

out that five key areas determine a groups capability: quality of leadership, quantity of members, quality of
members, availability of weapons, and their financial base. (p. 38) Effectiveness in counterterrorism, in the
authors formulation, involves deterring terrorists and their supporters through penalties and punishments,
increasing the ability of the security forces to identify and thwart terrorists, reducing the vulnerability
of potential targets, tackling the underlying grievances and root causes that give rise to terrorism, and
increasing the publics resilience in the face of terrorist attacks. (p. 102) The author is a Professor at the
University of East London, where he also serves as the program director for terrorism studies.

V.S. Subrahmanian, Aaron Mannes, Animesh Roul, and R.K. Raghavan, Indian Mujahideen:
Computational Analysis and Public Policy. New York, NY: Springer, 2014. US $ 109.00 [Hardcover], ISBN:
978-3-319-02817-0.

This is a highly innovative application by a multidisciplinary team of social scientists, law enforcement
experts, and scientists of computational techniques to examine the targeting techniques and attack patterns
of the Indian Mujahideen (IM) terrorist group. The book begins with an examination of the history and
evolution of IMs terrorist campaign against the Indian state, the nature of its organization and membership,
areas of operation, and links to other South Asian Islamist groups. It then transitions to a discussion of
the conceptual frameworks syntax and semantics of Temporal Probabilistic (TP) behavioral rules that
technologically compute the IMs attack and targeting behaviors. (p. 49) This chapter will be of particular
interest to the computational academic community and, as per the authors guidance, those readers who
are not familiar with such computational algorithmic techniques may skip this chapter without any loss of
relevant material. (p. 49) The succeeding chapters provide valuable and rich data about the IMs tactics, such
as bombings, simultaneous and timed attacks, and targeting patterns, such as attacking public sites, as well
as the total deaths caused by such attacks. Especially innovative is the chapter on computing policy response
options, which are based on the overall conceptual frameworks methodology and algorithm that are used to
automatically generate policy options in the form of a mathematical definition of a policy against IM that
has a high probability of significantly reducing most types of its attacks. (p. 107) The books final chapter
presents a recommendation to establish an Indian National Counter-Terrorism Center, because, among
other reasons, a major operational problem in Indias counterterrorism campaign is its lack of a coordinated
authority or even a central database of all arrested individuals, suspects, or ongoing operations. (p. 133) The
appendices describe the studys overall methodology and use of various classes of variables as sources for
data collection, as well as a chronological listing of IMs terrorist attacks. V.S. Subrahmanian is a professor
of computer science at the University of Maryland, College Park, where he also serves as Director of the
Laboratory for Computational Cultural Dynamics (LCCD), where Dr. Mannes serves as a research associate.
Animesh Roul, and R.K. Raghavan are prominent India-based researchers on terrorism.

Routledge Publications
Javier Argomaniz, The EU and Counter-Terrorism: Politics, Polity and Policies After 9/11. New York, NY:
Routledge, 2011. 208 pages, US$150.00 [Hardback], US$39.95 [Paperback], ISBN: 978-0-415-72406-7.

An insightful and comprehensive assessment of the strengths and weaknesses of the European Unions
response to terrorism, explaining how its numerous institutions conduct counterterrorism in the post-
9/11 era, including its attempts to coordinate its member-states policies, legislations and threats-related
intelligence information sharing. The authors research is based on a qualitative methodology that draws on
numerous interviews, policy documents and secondary literature.

Claude Berube and Patrick Cullen, (Eds.) Maritime Private Security: Market Responses to Piracy, Terrorism

ISSN 2334-3745 160 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

and Waterborne Security Risks in the 21st Century. New York, NY: Routledge, 2012. 272 pp., US $ 140.00
[Hardcover], US $ 39.95 [Paperback], ISBN: 978-0-415-72424-1.

The contributors to this edited volume, which is one of the first to comprehensively discuss the issue of
maritime private security, examine its historical origins and evolution as a private sector contribution
to countering piracy, terrorism, and other security-related maritime threats around the world, where
governments require the private sector to support and augment their own countermeasures in these spheres.

Tore Bjorgo (Ed.), Terror From the Extreme Right. New York, NY: Routledge, 1995. 332 pp., [Re-issued] US $
57.95 [Paperback], ISBN: 978-0-7146-4196-6.

When this edited volume was published in 1995, it represented one of the first times that the subject of far
right-wing terrorism in democratic societies was discussed in a systematic manner, making it a classic in the
field of terrorism studies at the time . It is still highly pertinent to the current era. The volumes contributors
discuss subjects such as the role of split delegitimization among extremist right-wing groups, and right-
wing violence in North America, Scandinavia, Germany, Italy, South Africa, and Japan. The volumes papers
were originally presented at a workshop supported by the Norwegian Ministry of Foreign Affairs in Berlin in
August, 1994.

Anna Cento Bull and Philip Cooke, Ending Terrorism in Italy. New York, NY: Routledge, 2013. 348 pp., US $
130.00 [Hardcover], ISBN: 978-0-415-60288-4.

An innovative and up-to-date examination of the processes that brought about the end of more than four
decades of left-wing and right-wing terrorism in Italy. The books chapters cover topics such as the roles of
Italian legal institutions, anti-terrorist legislation, and prison reform, as well as conflict resolution measures
such as conciliation and reconciliation, in ending terrorism. Other chapters discuss the perspectives of
former terrorists and victims on these issues. The concluding chapter places the case of Italy in comparative
perspective.

Myriam Dunn Cavelty and Victor Mauer, (Eds.) The Routledge Handbook of Security Studies. New York, NY:
Routledge, 2010. 488 pp. US $ 225.00 [Hardcover], US $ 54.95 [Paperback], ISBN: 978-0-415-66472-1.

The contributors to this comprehensive handbook examine significant components in security studies
including theoretical approaches to studying security issues (such as realism, liberalism, critical security
studies, post-structuralism, and feminism), contemporary security challenges (such as terrorism, weapons
of mass destruction, organized crime, state failure, energy security, public health breakdowns), and regional
security challenges (such as Chinas regional ambitions, conflicts in the Korean peninsula, India, Pakistan,
Afghanistan, the Middle East, and the Western Balkans), as well as future security challenges (in the form of
alliances, deterrence, coercive diplomacy, peace operations, humanitarian intervention, global governance,
and crisis management).

Ryan Clarke, Crime Terror Nexus in South Asia: States, Security and Non-State Actors. New York, NY:
Routledge, 2012. 232 pages, US $ 150.00 [Hardcover], US $ 39.95 [Paperback], ISBN: 978-0-415-72403-6.

A detailed and well-researched examination of the links between criminality and terrorism in South Asia,
focusing on the activities of terrorist actors that operate in Indian-held Kashmir (particularly Indian and
Pakistani proxies) and Pakistan (particularly Lashkar-i-Taiba, the Taliban, and al Qaida). The concluding
chapter discusses the challenges facing Pakistans ineffectual management of the terrorist and criminal groups

ISSN 2334-3745 161 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

that operate on its country and the spillover effects into the neighboring countries.

Richard Clutterbuck, Terrorism in an Unstable World. New York, NY: Routledge, 1994 [Re-issued in 2006].
235 pages, US$180.00 [Hardcover], ISBN: 978-0415103404.

Considered a classic when it was first published in the mid-1990s, this is a well-written and comprehensive
examination of the nature of the terrorist threat during the immediate post-Cold War period by a military
man turned academic. The volumes chapters cover topics such as the nature of conflict in the post-
Communist world, technological developments in terrorist weaponry and targeting, the role of intelligence
in counterterrorism, the nexus between terrorism and criminality, including narco-terrorism, the nature of
rural and urban guerrilla warfare, airport and aviation security, and the roles of civil liberties and the rule of
law in counterterrorism.

Gillian Duncan, Orla Lynch, Gilbert Ramsey and Alison M.S. Watson, (Eds.). State Terrorism and Human
Rights: International Responses Since the End of the Cold War. New York, NY: Routledge, 2013. 200 pp., US $
155.00 [Hardcover], US $ 42.95 [Paperback], ISBN: ISBN: 978-0415629072.

The contributors to this important volume examine the use of terrorism by certain states since the end of
the Cold War. The volumes chapters present an historical overview of state terrorism, including current
trends, obstacles to international responses against the use of state terror, as well as case studies that focus on
Saddam Husseins use of terror against the Kurds, Indonesias use of terror against the East Timor separatists,
genocidal terror in Rwanda, and the components of an effective international response to state terror. The
concluding chapter discusses the contribution of Paul Wilkinsons notion of state terror to understanding the
use of such coercive methods in the current period.

Laura C. Ferreira-Pereira and Bruno Oliveira Martins, (Eds.), The European Unions Fight Against
Terrorism: The CFSP and Beyond. New York, NY: Routledge, 2014. 160 pp., US $ 145.00 [Hardcover], ISBN:
978-0-415-84241-9.

The contributors to this edited volume examine the European Unions (EU) management of counterterrorism
in all its dimensions in the post-9/11 era. The chapters cover topics such as the external dimension of the
EUs counterterrorism policies, the United States influence in the construction of the EUs counterterrorism
policies and programs, the challenges to the EUs counterterrorism policies presented by the European
Parliament and the European Court of Justice, the EU as a global counterterrorism actor, and future trends
in the EUs counterterrorism campaign. This volume was originally published as a special issue of the
European Security journal.

Joshua Alexander Geltzer, US Counter-Terrorism Strategy and al-Qaeda: Signalling and the Terrorist World-
View. New York, NY: Routledge, 2010. 228 pp., US$150.00 [Hardcover], US$49.95 [Paperback], ISBN: 978-
0415664523.

A conceptually interesting examination of the ineffectiveness of the communicative components of the


Bush administrations counter-terrorist policies towards al Qaida. The authors conceptual framework on
communicators and audiences is applied to examine Americas counter-terrorist communications vis--vis al
Qaidas own world-view. The concluding chapters assess whether the right lessons were learned and provide
the authors recommendations for improving the communications components in US counterterrorism
against groups such as al Qaida.
Joseph Heller, The Stern Gang: Ideology, Politics and Terror, 1940-1949. New York, NY: Routledge, 1995/2006.

ISSN 2334-3745 162 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

392 pp., US$210.00 [Hardcover], ISBN: 978-0-7146-4558-2.

This is a reissue of the authors masterful 1995 account of the Stern Gang (also known as the Stern Group
or Lehi), the right-wing Jewish terrorist group that operated during Israels formative pre-state period. The
volumes chapters discuss the groups revisionist ideology, its split from the larger Irgun terrorist group, its
organizational formation, its terrorist activities, including political assassinations, and its political activities
following independence in the nascent Jewish State.

Brian Hesse (Ed.), Somalia: State Collapse, Terrorism and Piracy. New York, NY: Routledge, 2011. 128 pp., US
$ 140.00 [Hardcover], US $ 49.95[Paperback], ISBN: 978-0415828932

The contributors to this edited volume examine significant challenges facing Somalia in terms of the fragile
nature of its government and the twin threats to its stability presented by terrorism and piracy. Also discussed
are proposals how the international community can help stabilize the situation in Somalia, the influence of
Kenyan Somalis in Somalia, as well as several areas where Somalia has achieved a certain degree of success,
such as in communications and banking. The volume was originally published as a special issue of the Journal
of Contemporary African Studies.

Clive Jones and Ami Pedahzur, Eds,), Between Terrorism and Civil War: The Al-Aqsa Intifada. New York,
NY: Routledge, 2005. 176 pp., US $ 170.00 [Hardcover], US $ 49.95 [Paperback], ISBN: 978-0415434539.

The contributors to this volume examine significant aspects of the al Aqsa intifada (uprising) by the
Palestinians against continued Israeli rule in the West Bank and the Gaza Strip, which began around
September 2000. The chapters provide conceptual frameworks on the linkage between terrorism and civil
war, the causes of Jewish settler vigilante terrorism against the Palestinians, the attitude among Palestinians
towards political reform, the role of the peacekeeping force in Hebron in attempting to prevent conflict
escalation, attitudes towards the intifada by Jordan and Egypt, the role of Hizballah as a shadow actor in the
intifada, and an assessment of the intifadas political and military effectiveness. The volume was originally
published as a special issue of the journal Civil Wars.

Naim Kapucu, The Network Governance in Response to Acts of Terrorism: Comparative Analysis. New York,
NY: Routledge, 2012. 281 pp., US $ 140 [Hardcover], ISBN: 9780415500111.

A highly interesting comparative analysis of the use of what the author terms network governance to
effectively and comprehensively respond to and recover from catastrophic terrorist incidents. The author uses
the cases of major terrorist incidents in New York, Bali, Istanbul, Madrid, London, and Mumbai to illustrate
how a networked response system could have vastly improved the responses by the authorities in mass-
casualty emergency situations.

George Klay Kieh and Kelechi Kalu, (Eds.)editors, West Africa and the U.S. War on Terror. New York, NY:
Routledge, 2013. 224 pages, US$130.00 [Hardcover], ISBN: 978-0415539425.

The contributors to this important edited volume assess the effectiveness of the United States
counterterrorism assistance to West African states. The volumes chapters cover topics such as a general
overview of U.S. counterterrorism, Sub-Saharan Africa as an additional front in U.S. counterterrorism, how
West Africa perceives U.S. counterterrorism, the implications of the crisis in Nigerias Niger Delta region, the
Mauritanian military and U.S. counterterrorism, West Africa regional security and U.S. counterterrorism,
and the consequences of U.S. counterterrorism for West Africa.

Peter Lehr, (Eds.), Violence at Sea: Piracy in the Age of Global Terrorism. New York, NY: Routledge/Lloyds

ISSN 2334-3745 163 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Marine Intelligence Unit, 2007. 272 pp., US $ 165.00 [Hardcover], US $ 54.95 [Paperback], ISBN: 978-
0415953207.

The contributors to this highly authoritative edited volume examine the full magnitude of the threats to
global security and commerce presented by maritime piracy within the broader context of international
terrorism. The chapters discuss issues such as the major hot spots of piracy in Somalia, the Arabian Sea, the
Bay of Bengal, and the Straits of Malacca-South China Sea, and the militant groups that engage in maritime
piracy, as well as international legal and naval responses to the threats of piracy. The concluding chapter
assesses future trends in the evolving threat of maritime terrorism.
James M. Lutz and Brenda J. Lutz, Global Terrorism. [Third edition]. New York, NY: Routledge, 2013. 392
pp., US $ 145.00 [Hardcover], US $ 44.95 [Paperback], ISBN: 978-0415539456.

This well-organized and well-written textbook provides a comprehensive overview of terrorism in all its
dimensions. The chapters cover topics such as the history and evolution of terrorism, defining and classifying
terrorism, terrorists strategies, tactics, weapons, and targets, the roles of state sponsors and other supporters
of terrorism, religious, ethnic, nationalistic, left- and right-wing bases of terrorism, prominent terrorist
groups, countries with multiple crises of terrorism, the components of counterterrorism, and future trends in
terrorist warfare.

Claire Macken, Counter-Terrorism and the Detention of Suspected Terrorists: Preventive Detention and
International Human Rights Law. New York, NY: Routledge, 2011. 232 pp., US $ 150.00 [Hardcover], US $
49.95 [Paperback], ISBN: 978-0415859219.

A highly authoritative and balanced examination of the relationship between preventive detention of
suspected terrorists and international human rights law within the broader context of counterterrorism.
The volumes chapters cover topics such as defining preventive detention, examples of the use of preventive
detention in the United Kingdom in general and Northern Ireland in particular, the right to personal liberty
in international human rights law as a legal framework for the consideration of state preventive detention
laws (including in a state of emergency), and legitimate and illegitimate purposes of preventive detention.
The concluding chapters present a model law for the detention of suspected terrorists within a criminal law
framework, including a discussion of instances in which preventive detention can be used for legitimate
purposes.

Nicola McGarrity, Andrew Lynch and George Williams, (Eds.). Counter-Terrorism and Beyond: The Culture
of Law and Justice After 9/11. New York, NY: Routledge, 2010. 243 pp., US $ 150.00 [Hardcover], US $ 44.95
[Paperback], ISBN: 978-0415631396.

The contributors to this edited volume examine what they term the culture of control that has been
instituted in several democratic countries as part of their counterterrorism campaigns. The chapters cover
topics such as the roles of pre-emptive policing and the use of intelligence in counterterrorism, the creation
of a culture of suspicion in community surveillance, the use of extraordinary measures in legal proceedings,
and how the media may be used as information proxies for government authorities. Australia and the United
States are employed as case studies to illustrate the contributors arguments. The concluding chapter discusses
best practices in protecting human rights during periods of emergency for counterterrorism campaigns.
George Michael, Confronting Right-Wing Extremism and Terrorism in the USA. New York, NY: Routledge,
2012. 304 pp., US $ 180.00 [Hardcover], US $ 54.95 [Paperback], ISBN: 978-0-415-62844-0.

In this paperback edition of the originally published 2003 book, the author examines the state of far right-

ISSN 2334-3745 164 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

wing extremism at the time, including the effectiveness of the U.S. governments response to this threat. Far
right-wing extremist groups such as the Ku Klux Klan, the militias, American Renaissance and White Aryan
Resistance are profiled. This books assessments are still pertinent in light of the resurgence of far right-wing
extremist groups in the current era.

David Miller, Jessie Blackbourn, Rani Dhanda and Helen Dexter (Eds.), Critical Terrorism Studies Since 11
September 2001. New York, NY: Routledge, 2014. 156 pp., US $ 145.00 [Hardcover], ISBN: 978-0415838528.

The contributors to this edited volume are critical of what they term the orthodox terrorism studies
approach, which they claim uses shoddy research and lacks academic independence because it is sometimes
closely identified with government counterterrorism agencies. To remedy these perceived shortfalls, the
volumes chapters cover topics such as an assessment of their own findings since 9/11, the roles of drones
in counterterrorism, the reliance on false positives in the UKs preemptive counterterrorism measures, an
assessment of the UKs attempts to reach out to suspect communities (e.g., the British Irish and Muslim
communities), and a concluding discussion of whether the category of terrorism improves or impedes our
intellectual understanding of a certain type of violence (p. 121).

Andrew Mumford and Bruno C. Reis, (Eds.), The Theory and Practice of Irregular Warfare: Warrior-
Scholarship in Counter-Insurgency. New York, NY: Routledge, 2014. 176 pp., US $ 150.00 [Hardcover], ISBN:
978-0-415-83690-6.

The contributors to this edited volume assess the contributions of warrior-scholars who had developed
significant theories that shaped the doctrine and practice of counter-insurgency (as well as counter-
terrorism) over the years. These warrior-scholars include Charles E. Callwell, David Galula, Roger Trinquier,
Moshe Dayan, Frank Kitson, David Kilcullen, and David Petraeus.

Peter R. Neumann and M.L.R. Smith, The Strategy of Terrorism: How It Works, and Why It Fails. New York,
NY: Routledge, 2009. 140 pp., US $ 158.00 [Hardcover], US $ 49.95 [Paperback], ISBN: 978-0415545266.

An insightful account of how terrorism, even in its nihilistic variety, is a strategy by a weaker group as a
violent means to achieve its objectives. Thus, in the authors view, even relatively small-scale attacks that are
able to inflict a psychological impact on their targeted audiences can be considered to be successful from
the terrorists idiosyncratic perspective. The authors note, however, that true success for a terrorist group
involves gaining legitimacy for their cause by exploit[ing] the emotional impact of the violence to insert an
alternative political message in order to seek to broaden support, often through the media and political front
organizations. (p. 95) The authors conclude that effective counterterrorism, as a result, requires identifying
their terrorist adversarys motivations, intentions and modus operandi in order to respond to them with
specific and tailored countermeasures, including effectively incorporating civil liberties into such campaigns.

Colin Murray Parkes, (Ed.), Responses to Terrorism: Can Psychological Approaches Break the Cycle of
Violence? New York, NY: Routledge, 2014. 280 pages, US$170.00 [Hardcover], US$53.95 [Paperback], ISBN:
978-0415706247.

The contributors to this highly interesting edited volume draw on the discipline of psychology to explain
the origins of extremism and terrorism, the nature of governments responses to terrorist attacks, and how
to break the cycle of terrorism through effective utilization of conflict resolution approaches. The chapters
cover topics such as the psychology of extremism, group identity and the roots of terrorism, the roots of
the conflicts in Northern Ireland and Rwanda, and the roles of schools, universities, the media, leaders, and
others in helping to break the cycle of terrorist violence. The concluding chapter synthesizes the findings and

ISSN 2334-3745 165 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

offers recommendations for new thinking on these issues.

Suvendrini Perera and Antonio Traverso, (Eds.). Living Through Terror: (Post) Trauma, (Post) Conflict and
the South. New York, NY: Routledge, 2011. 176 pp., US $ 140.00 [Hardcover], ISBN: 978-0415614474.

The contributors to this edited volume examine how the phenomenon of terrorism impacts the daily lives
of its affected populations, many of whom become internally displaced refugees. What makes this volume
special is its focus on the impact of terrorist conflicts on the populations outside the West, in particular the
Philippines, South Africa, East Timor and Aceh (Indonesia), and Fiji, although it also covers some Western
theatres of terror such as Italy.

Mark Phythian (Ed.) Understanding the Intelligence Cycle. New York, NY: Routledge, 2013. 184 pp., US $
135.00 [Hardcover], ISBN: 978-0415811750.

The contributors to this innovative volume in intelligence studies examine the history and evolution of
the intelligence cycle, including alternative ways of conceptualizing the intelligence process. The volumes
chapters cover topics such as the move from the intelligence cycle to Internet-based intelligence, and
using the intelligence cycle in the corporate world and in intelligence-led policing. The concluding chapter
discusses applying intelligence theory to broaden the focus of the intelligence cycle, for instance in being able
to use intelligence methods not only to identify and thwart impending terrorist plots but to help focus work
to prevent radicalization and enhance community cohesion. (p. 143)

Kacper Rekawek, Irish Republican Terrorism and Politics: A Comparative Study of the Official and the
Provisional IRA. New York, NY: Routledge, 2011. 208 pp., US $ 150.00 [Hardcover], US $ 48.95 [Paperback],
ISBN: 978-1-13-882544-4.

A highly interesting account of the history of the two primary Irish republican terrorist groups, and the
impact of certain developments in their histories on how their differing political beliefs and armed militancy
evolved over the years.

David C. Rapoport, (Ed.). Terrorism: Critical Concepts in Political Science Volume I: The First or Anarchist
Wave; Volume II: The Second or Anti-Colonial Wave; Volume III: The Third or New Left Wave; Volume IV:
The Fourth or Religious Wave. New York, NY: Routledge, 2006. 2,376 pp., US $ 1,530.00 [Hardcover], ISBN:
9780415316507.
This is one of the most comprehensive and indispensable collections of academic scholarship, bringing
together seminal analyses published on the history of modern terrorism. The collections 85 chapters are
organized around the editors widely adopted notion of the four historical waves of modern terrorism (which
is discussed in Chapter 64 in Volume IV), with the four volumes corresponding to each of the successive
four waves. As explained by the editor, A number of recurring themes are examined, such as the rise and fall
of organizations, changes in purposes and tactics, counter-terrorism, civil liberties, international contexts
and geographies (Vol. I, p. xxvii). With so many new developments occurring since the collections 2006
publication in terrorism, counterterrorism and the academic literature on these issues, it is hoped that a fifth
volume will eventually be published that will cover the fifth historical wave of terrorism. The compiler is the
founder and principal editor of Terrorism and Political Violence, the most highly regarded journal in the field
of terrorism studies. The only drawback to this series of four volumes is its astronomical price which places it
beyond the budget of students who would profit most of it.

Anthony Richards, Pete Fussey and Andrew Silke, (Eds.), Terrorism and the Olympics: Major Event Security
and Lessons for the Future. New York, NY: Routledge, 2012. 272 pages, US$150.00 [Hardcover], US$49.95

ISSN 2334-3745 166 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

[Paperback], ISBN: 978-0415532426.

The contributors to this edited volume comprehensively examine all the significant issues that need to be
addressed in securing an Olympic event from potential terrorist attacks. The volumes chapters discuss the
history of terrorist threats against Olympic games, beginning with the 1972 Munich Olympics, the types of
terrorist threats that need to be considered by security planners, al Qaedas possible intentions to attack an
Olympic event, and understanding terrorist target selection, as well as the response measures that need to be
considered, such as securing the transport system, implementing an effective surveillance security system,
the role of the private security industry in securing such sites, the challenge of inter-agency coordination in
managing all aspects of security, and future trends in terrorist threats against the Olympic games. The volume
was written with an eye on the Olympic summer games in London in 2012, where security was both costly
and effective.

Peter Romaniuk, Multilateral Counter-Terrorism: The Global Politics of Cooperation and Contestation.
New York, NY: Routledge, 2010. 240 pp., US $ 140.00 [Hardcover], US $ 35.95 [Paperback], ISBN: 978-
0415776479.

An account of the effectiveness of multilateral responses to terrorism by international organizations such as


the United Nations, and the conditions that facilitate or hinder individual states to cooperate in defeating the
terrorist threat. With the introductory chapter laying the groundwork by defining and analyzing the nature
of multilateral counter-terrorism, the books chapters discuss issues such as historical precedents for such
cooperation, which began with the League of Nations cooperation in countering anarchist terrorism, and its
evolution in the form of the United Nations from 1945 to 2001, and then following 9/11 to the present day.
The concluding chapters discuss future trends in multilateral counter-terrorism, including possibly moving
beyond the UN.

Ben Sheppard, The Psychology of Strategic Terrorism: Public and Government Responses to Attack. New York,
NY: Routledge, 2009. 262 pp., US $ 155.00 [Hardcover], US $ 49.95 [Paperback], ISBN: 978-0415578103.

A highly original, conceptually innovative examination of the psychological impact of terrorism on its
intended victims, particularly a targeted societys civilian population. Also discussed are how such targeted
publics respond to the terrorist attacks and the measures governments need to adopt to build up their
populations resilience to terrorism. The chapters present an overview of the various disciplines utilized
in the study of international relations, psychiatry and psychology. They also analyze case studies of Israel
and the Scud missile attacks during the 1991 Gulf War, Aum Shinrikyos March 1995 Tokyo sarin attack, al
Qaedas 9/11 attacks, the September 2001 anthrax attacks, and Israel and the Second Palestinian Intifada. The
final chapter discusses the studys key assumptions, evidence from two further cases, the contribution of the
studys findings to key fields, and policy recommendations.

Asaf Siniver (Ed.), International Terrorism Post-9/11: Comparative Dynamics and Responses. New York, NY:
Routledge, 2010. 256 pp., US $ 150.00 [Hardcover], US $ 49.95 [Paperback], ISBN: 978-0415622189.
The contributors to this edited volume examine the effectiveness of counterterrorism campaigns by
governments around the world in the post-9/11 era. The chapters cover topics such as responses to
radicalization into violent extremism and terrorism in the Middle East and North Africa, and the
counterterrorism campaigns by America, Australia, India, Israel, Russia, the United Kingdom, as well as
various Southeast Asian governments.

G. Davidson Smith, Combating Terrorism. [Routledge Revivals] New York, NY: Routledge, 1990/2011. 324

ISSN 2334-3745 167 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

pp. US $ 145.00 [Hardcover], US $ 42.95 [Paperback], ISBN: 978-0415615310.

First published in 1990 when it became a classic in the field of counterterrorism studies, it remains an
indispensable analysis on how to understand the terrorist threat and the components that constitute effective
counterterrorism. The volumes chapters discuss the nature of the terrorist threat in terms of its motivations,
aims and strategies, and the components of counterterrorism in terms of the philosophical foundations
for the use of force, counterterrorisms direct (active) and indirect (passive) measures, the resources and
capabilities that need to be assembled to counter terrorism, and the factors required for effective decision-
making and crisis-management. Numerous case studies are provided, such as a comparative survey of
counterterrorism campaigns by the United States, Canada, and the United Kingdom.

Andrew T.H. Tan (Ed.), The Politics of Terrorism: A Survey. New York, NY: Routledge, 2011. 288 pp., US $
305.00 [Hardcover], US $ 67.95 [Paperback], ISBN: 978-1-85743-579-5.

First published in 2006, this comprehensive handbook consists of essays written by academic experts in
the field on various aspects of terrorism and counterterrorism, an A-Z glossary of major terrorist groups
and incidents, maps of terrorist conflict zones, statistics on different types of terrorist incidents (by region,
target and tactic), and a select bibliography. Although now dated, the handbook remains indispensable as a
reference resource with its essays on the history of modern terrorism, the evolution of terrorist weapons and
tactics, ethnic-based terrorism, left- and right-wing terrorism, religion and terrorism, state terrorism, and
counterterrorism.

Edgar B. Tembo, US-UK Counter-Terrorism After 9/11: A Qualitative Approach. New York, NY: Routledge,
2014. 176 pp. US $ 135.00 [Hardcover], ISBN: 978-0-415-64378-8.

A conceptually innovative comparative examination of the effectiveness of counterterrorism campaigns by


the United Kingdom and the United States in the post-9/11 era. The volumes chapters focus on three policy
instruments in their counterterrorism campaigns: the use of intelligence, law enforcement and military
measures.

Mattia Toaldo, The Origins of the US War on Terror: Lebanon, Libya and American Intervention in the Middle
East. New York, NY: Routledge, 2013. 214 pp., US $ 130.00 [Hardcover], ISBN: 978-0-415-68501-6.

A highly interesting account of the formative origins of United States counterterrorism during the Reagan
administration in the 1980s. The volumes chapters discuss significant milestones in the development of U.S.
counterterrorism, beginning with the 1979 Iranian revolutions mobilization of Lebanese Shiite elements,
which eventually led to the U.S. involvement in the Lebanese civil war, the formation of the influential Bush
Task Force on Combating Terrorism, and Americas pre-emptive strikes to counter the Libyan regimes
engagement in terrorism. The concluding chapter assesses the legacies of some of those counterterrorism
policies with current American campaigns.

Harmonie Toros, Terrorism, Talking and Transformation: A Critical Approach. New York, NY: Routledge,
2012. 256 pp., US $ 135.00 [Hardcover], ISBN: 978-0-415-68392-0.

Drawing on the authors extensive field research, this is an important conceptual and empirical account of the
crucial role of negotiating with terrorists as a way of transforming terrorist violence into more constructive
non-violent ways to achieve their objectives. The case studies of talking to terrorists in Northern Ireland and
in Mindanao are employed to demonstrate the authors thesis.

Stephen Vertigans, The Sociology of Terrorism: People, Places and Processes. New York, NY: Routledge, 2011.

ISSN 2334-3745 168 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

226 pp., US $ 165.00 [Hardcover], US $ 52.95 [Paperback], ISBN: 978-0-415-57266-8.

This book is an innovative application of sociological research to examine terrorism in all its manifestations.
The volumes chapters discuss how the sociological approach contributes to the study of the origins of
terrorism, the violent dispositions that create terrorists, the roles of groups in mobilizing individuals into
terrorism, the processes of group dynamics that sustain terrorist groups, the rationale behind terrorist attacks
and targeting, and how terrorism ends either through defeat or disengagement by a groups members from
terrorism. Numerous case studies examine these issues.

Martin I. Wayne, Chinas War on Terrorism: Counter-Insurgency, Politics and Internal Security. New York, NY:
Routledge, 2008. 206 pp., US $ 158.00 [Hardcover], US $ 49.95 [Paperback], ISBN: 978-0-415-54518-1.

Although published in 2008, the recent escalation of the domestic terrorist threat in Chinas Xinjiang region
makes this books comprehensive, authoritative and detailed analysis highly relevant to the current era.
The volumes chapters discuss the nature of the Islamist insurgency in Xinjiang, the components of Chinas
counterterrorism campaign, including its waging of the war of ideas to reshape society in Xinjiang, and an
assessment of the strategic and tactical effectiveness of Chinas overall response measures.

Leonard Weinberg, Democracy and Terrorism: Friend or Foe? New York, NY: Routledge, 2013. 136 pp., US $
152.00 [Hardcover], US $ 39.95 [Paperback], ISBN: 978-0-415-77034-7.

A highly insightful and original account by a veteran academic analyst about the relationship between
democratic governments and the origins and management of politically-motivated terrorism that threatens
them. The volumes chapters discuss the history of terrorism against democratic states beginning in the
19th century, as well as during the third wave from the mid-1970s to the early 1990s, the use of terrorism
in the Arab Spring, which began in 2011, and the relationship between terrorist violence and democratic
governments rule of law, which is posed as a question of If democracies are vulnerable to terrorist violence,
what changes, if any, do they have to make in order to cope with this danger? (p. 79) The authors conclusion
is pessimistic: terrorism in the first-wave democracies may approach something like the cost of doing
business, while terrorism in the more recent democracies may be symptomatic of serious problems that place
the democratic order itself in jeopardy (p. 103).

David J. Whittaker, The Terrorism Reader. [Fourth Edition] New York, NY: Routledge, 2012. 368 pp., US $
140.00 [Hardcover], US$45.95 [Paperback], ISBN: 978-0-415-68732-4.

This is a comprehensive and authoritative introductory overview of terrorism and counterterrorism,


drawing its material from a variety of sources. This updated and revised edition is divided into three parts:
characteristics of terrorism (e.g., defining terrorism, motivation for terrorism and terrorist conflicts around
the world), significant terrorist conflict zones (e.g., jihadi insurgents, the United Kingdom, Israel, Lebanon,
Sri Lanka, Spain, Algeria, Germany, and Italy), and the components of counterterrorism (e.g., ethical and
legal issues, campaigns and strategies).

Mark P. Worrell, Terror: Social, Political, and Economic Perspectives. New York, NY: Routledge, 2013. 78 pp.,
US $ 10.95 [Paperback], ISBN: 978-0-415-52032-4.

Part of the publishers new series of concise thinking frames on significant current issues, this monograph
discusses the sociological basis of terrorism, the nature of counterterrorism, what the author terms the
business of security (i.e., the ever-growing counterterrorist-industrial complex) and the terror of empire
and the empire of terror. Although one may not agree with some of the authors assumptions, the critical

ISSN 2334-3745 169 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

issues that are raised are worth considering.

About the Reviewer: Dr. Joshua Sinai is the Book Reviews Editor of Perspectives on Terrorism. He can be
reached at: [email protected].

ISSN 2334-3745 170 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

V. News

News from the National and Regional Networks of Ph.D Thesis Writers
Two new local networks of the Terrorism Research Initiative (TRI) have come into existence:

Pakistan: Country Coordinator:Muhammad Feyyaz (< [email protected] >)

Nigeria: Country Coordinator: Adeboye Wale(< [email protected] >)

Post-graduate students in/from Nigeria and Pakistan working on a Ph.D. thesis on terrorism, counter-
terrorism, political violence and armed conflict are invited to contact the country coordinators of TRI.

TRI now has a dozen national networks of Ph.D. theses writers. Those completing their doctoral dissertation
in 2014 are invited to submit their thesis for the competition Best Ph.D. Thesis on Terrorism and
Counterterrorism 2014. The deadline for the submission of a Ph.D. thesis is 31 March 2015. The winner of
the TRI Thesis Award will receive a prize of US $ 1,000.

Submissions should be sent, together with a cover letter explaining the merits of the thesis, to the chairman of
the jury, Prof. em. Alex P. Schmid (< [email protected] >). Participation is open to authors
of doctoral dissertations submitted or defended in 2014 at any recognised academic institutionnot just those
from the twelve countries currently in a TRI national network. The theses have to be written in English or
have to be translated into English.

ISSN 2334-3745 171 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

VI. Notes from the Editor

About Perspectives on Terrorism


Perspectives on Terrorism (PT) is a joint publication of the Terrorism Research Initiative (TRI), headquartered
in Vienna, Austria, and the Center for Terrorism and Security Studies (CTSS), headquartered at the Lowell
Campus of the University of Massachusetts, United States of America.

PT is published six times per year as a free peer-reviewed online journal available at www.terrorismanalysts.
com. It seeks to provide a platform for established scholars as well as academics and professionals entering
the interdisciplinary fields of Terrorism, Political Violence and Conflict Studies. The editors invite readers to:

present their perspectives on the prevention of, and response to, terrorism and related forms of
violent conflict;

submit to the journal accounts of evidence-based, empirical scientific research and analyses;

use the journal as a forum for debate and commentary on issues related to the above.

Perspectives on Terrorism has sometimes been characterised as nontraditional in that it dispenses with some
of the traditional rigidities associated with commercial print journals. Topical articles can be published at
short notice and reach, through the Internet, a much larger audience than subscription-fee based paper
journals. Our free on-line journal also offers contributors a higher degree of flexibility in terms of content,
style and length of articles but without compromising professional scholarly standards.

The journals articles are peer-reviewed by members of the Editorial Board as well as outside experts. While
aiming to be policy-relevant, PT does not support any partisan policies regarding (counter-) terrorism and
conflict-waging. Impartiality, objectivity and accuracy are guiding principles that we require contributors to
adhere to.

Editorial Team of Perspectives on Terrorism


Alex P. Schmid, Editor-in-Chief

James J.F. Forest, Co- Editor

Joseph J. Easson, Associate Editor

Joshua Sinai, Books Reviews Editor

Eric Price, Editorial Assistant

Judith Tinnes, Editorial Assistant

ISSN 2334-3745 172 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Members of the Editorial Board


The Editorial Board of Perspectives on Terrorism currently consists of 20 experienced researchers. They are (in
no particular order):

Shazad Ali (Karachi, Pakistan)

Joost Augusteijn (Leiden, The Netherlands)

Jeffrey M. Bale (Monterey, USA)

Michael Boyle (Philadelphia, USA)

Jarret Brachman (North Dakota, USA)

Richard Chasdi (Walsh College, USA)

James Chip O. Ellis (Vancouver, Canada)

Leah Farrall (Massey University, New Zealand)

Paul Gill (University College London)

Jennifer Giroux (ETH, Zrich, Switzerland)

M.J. Gohel (Asia-Pacic Foundation, London)

Beatrice de Graaf (Utrecht University, The Netherlands)

Thomas Hegghammer (Stanford University, USA)

Bradley McAllister (Washington, DC, USA)

John Morrison (University of East London)

Assaf Moghadam (ICT, Herzliya, Israel)

Sam Mullins (Wollongong, Australia)

Thomas Riegler (Vienna, Austria)

Simon Shen (Chinese University, Hong Kong)

Anne Speckhard (Georgetown University Medical School, USA)

Currently there are several vacancies on the Editorial Board. Readers of Perspective on Terrorism are invited
to submit names of possible candidates. Selection will take place on the basis of the publication record of
those nominated, taking also into account their contribution to a better gender and geographical balance of
the Editorial Board.

Members of the Editorial Board act as peer-reviewers for articles submitted to Perspectives on Terrorism. In
addition, the Editorial Board relies on the special expertise of other experienced researchers. In particular we
would like to acknowledge the contributions of

Dr. Dean Alexander

Dr. O. Shawn Cupp

ISSN 2334-3745 173 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Dr. Alessandro Orsini

Dr. Brian Philips

Dr. P. Daniel Silk

Dr. James Wirtz

People Behind the Terrorism Research Initiative

The Terrorism Research Initiative (TRI) has three Directors: Robert Wesley (President), Alex P. Schmid
and James J.F. Forest. TRI has an International Advisory Board (currently 11 members), a Consortium of
Participating Institutions (currently 17 institutions and centers) as well as Group of Individual Researchers
(currently 120) guiding and supporting its efforts. They are listed below.

International Advisory Board of the Terrorism Research Initiative


Adam Dolnik,University of Wollongong, Australia.

Javier Jordn is a Professor at the Universidad de Granada, Spain, and Director of Athena Intelligence.

Gary LaFree is a Professor of Criminology at the University of Maryland and the Director of the National
Consortium for the Study of Terrorism and Responses to Terrorism (START).

David Rapoport is Professor Emeritus of Political Science at UCLA, a Mellon Foundation Emeritus Fellow,
Founding and Co-Editor of the journal Terrorism and Political Violence.

Marc Sageman is a Consultant on transnational terrorism with various governmental agencies and foreign
governments and the author of Understanding Terror Networks and Leaderless Jihad.

Michael Scheuer is currently a Senior Fellow with The Jamestown Foundation, prior to which he served in
the CIA for 22 years where he was the Chief of the bin Laden Unit at the Counterterrorist Center from 1996
to 1999.

Yoram Schweitzer is a Researcher at the Institute for National Security Studies and Lecturer at Tel Aviv
University.

Michael S. Stohl is Professor of Communication at the University of California at Santa Barbara (UCSB).

Jeff Victoroff is an Associate Professor of Clinical Neurology and Psychiatry at the Keck School of Medicine,
University of Southern California.

Peter Waldmann is Professor Emeritus of Sociology at the University of Augsburg, Germany, and a long time
member of the Advisory Board of the German Ministry of Development.

Leonard Weinberg is Foundation Professor of Political Science at the University of Nevada.

Consortium of Participating Institutions


Athena Intelligence, Spain.

Center on Terrorism, John Jay College, USA.

ISSN 2334-3745 174 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Centre for Terrorism and Counterterrorism (CTC) at Campus The Hague of Leiden University, Netherlands.

(Handa) Centre for the Study of Terrorism and Political Violence (CSTPV), University of St. Andrews,
Scotland.

Centre for Transnational Crime Prevention (CTCP), University of Wollongong, Australia.

Consortium for Strategic Communication, Arizona State University, USA.

Defense & Strategic Studies Department, Quaid-I-Azam University, Islamabad, Pakistan.

Department of International Relations, University of Minas (PUC) , Brazil.

Global Terrorism Research Centre (GTReC), Monash University, Australia.

International Centre for Political Violence and Terrorism Research (ICPVTR), Singapore.

Institute for National Security and Counterterrorism, Syracuse University, USA.

The Institute of International and European Affairs, (IIEA), Dublin, Ireland, with a branch in Brussels.

Pakistan Institute for Peace Studies (PIPS), Islamabad, Pakistan.

Research Institute for European and American Studies (RIEAS), Athens, Greece.

Research Unit, Political Violence, Terrorism and Radicalization, Danish Institute for International Studies
(DIIS), Denmark.

University of the Pacific, School of International Studies, USA.

University of Wisconsin, Oshkosh Institute for the Study of Religion, Violence and Memory, USA.

TRIs Individual Participants


Mahan Abedin is a former editor of the Jamestown Foundations Terrorism Monitor and currently the
Director of Research at the Centre for the Study of Terrorism , London. He is editor of Islamism Digest - a
monthly academic journal specialising on the in-depth study of Islamic movements.

Gary Ackerman is Research Director at the National Consortium for the Study of Terrorism and Responses
to Terrorism (START)

Shaheen Afroze is Research Director and Head of the Peace and Conflict Studies Division at the Bangladesh
Institute of International and Strategic Studies (BIISS).

Abdullah Alaskar is Professor of History at King Saud University, columnist, Riyadh daily newspaper.

Mustafa Alani is a Senior Advisor and Program Director in Security and Terrorism Studies at the Gulf
Research Center, UAE.

Rogelio Alonso is Professor in Politics and Terrorism at Rey Juan Carlos University, Madrid, where he holds
the position of Ramn y Cajal Fellow in Political Sciences.

Ramiro Anzit Guerrero is a Senior Advisor in the Argentine National Congress and Professor at the
University del Salvador and University del Museo Social Argentino.

ISSN 2334-3745 175 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Victor Asal joined the faculty of the Political Science Department of the University at Albany in Fall 2003
and is also the Director of the Public Security Certificate at Rockefeller College, SUNY, Albany.

Omar Ashour is Director, Middle East Studies, Institute of Arab and Islamic Studies University of Exeter

Scott Atran is Presidential Scholar at the John Jay College of Criminal Justice in New York City, Visiting
Professor of Psychology and Public Policy at the University of Michigan, and Research.

Edwin Bakker is Professor of Terrorism and Counter-Terrorism Studies at the Campus The Hague of Leiden
University and Director of its Center for Terrorism and Counter-Terrorism. He is also a Research Fellow at
the International Centre for Counter-Terrorism in The Hague

Daniel Baracskay is a full-time faculty member in the Department of Political Science at Valdosta State
University, where he also teaches public administration courses.

Michael Barkun is professor of Political Science in the Maxwell School at Syracuse University.

Shazadi Beg is a Barrister in the United Kingdom and an acknowledged expert on Pakistan.

Gabriel Ben-Dor is Director of the School of Political Sciences and Head of the National Security Graduate
Studies Program at the University of Haifa, where he teaches and conducts research in the fields of political
violence, civil-military relations and national security.

Eddine Benhayoun is a Professor of Cultural Studies and Director of the Research Group on Culture and
Globalisation, Abdelmalek Essaadi University, Tetuan, Morocco.

Andrew Black is the Managing Director of Black Watch Global, an intelligence and risk management
consultancy headquartered in Washington, DC.

Mia Bloom is Professor of Security Studies at the University of Massachussetts (Lowell Campus).

Randy Borum is a Professor at the University of South Florida and a behavioral science researcher/
consultant on National Security issues.

Anneli Botha is a senior researcher on terrorism at the Institute for Security Studies (ISS) in Pretoria, South
Africa.

Amel Boubekeur is a Research Fellow and the leader of the Islam and Europe programme at the Centre for
European Policy Studies in Brussels, focusing on Political Islam in Europe and North Africa.

Jarret Brachman is a member of the faculty of North Dakota State University and an independent Al-Qaeda
analyst. He runs a jihadist monitoring blog

Jean-Charles Brisard is an international consultant and expert on terrorism and terrorism financing.

Francesco Cavatorta is a lecturer in International Relations and Middle East politics at the School of Law
and Government, Dublin City University, Dublin, Ireland.

David Charters is a military historian and senior fellow at the Gregg Center, University of New Brunswick,
Canada.

Erica Chenoweth is Assistant Professor of Government at Wesleyan University and a visiting scholar at
Stanford University, California.

ISSN 2334-3745 176 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

David Cook is an Associate Professor of religious studies at Rice University, specializing in apocalyptic
literature and movements, radical Islamic thought and West African Islam.

Victor D. Comras is an attorney and consultant on terrorism, terrorism-financing, sanctions and


international law. He served as one of five International Monitors appointed by the Security Council to
oversee the implementation of measures imposed against al Qaeda, the Taliban, and associated terrorist
groups.

Maura Conway is the MA Programme Director at the School of Law & Government, Dublin City University.

Steven R. Corman is the Director of the Consortium for Strategic Communication at Arizona State
University.

Anja Dalgaard-Nielsen is the Head of Research Unit, Political Violence, Terrorism and Radicalization at the
Danish Institute for International Studies (DIIS).

Luis de la Corte is a Professor of social psychology at the Universidad Autnoma de Madrid, and an
investigator at Athena Intelligence.

James Dingley is a sociologist and former lecturer on terrorism and political violence at the University of
Ulster. He is now running his own consultancy on terrorism (Cybernos Associates) and chairs the Northern
Ireland think tank Northern Light Review.

Vera Eccarius-Kelly is an Assistant Professor of Comparative Politics at Siena College in Albany, NY,
specialized in Latin American and Middle East politics, and, in particular, on revolutionary and social
movements in Central America and Muslim Minority activism in Europe.

Rodney Faraon is Director of Intelligence and Threat Analysis for the Walt Disney Companys Global
Security Division.

Shabana Fayyaz is an Assistant Professor with the Defense and Strategic Studies Department at the Quaid-
IzamUniversity, Islamabad and is also a Doctoral Candidate at the Political Science Department, University
of Birmingham, UK.

James Forest is one of the three directors of the Terrorism Research Initiative and co-editor of Perspectives
on Terrorism. He is Director of the Security Studies at the University of Massachusetts at its Lowell Campus
and was the first director of the Center for Terrorism and Security Studies. He is also a Senior Fellow at the
Joint Special Operations University in Tampa, Florida.

Jennifer Giroux is a CRN Researcher in Terrorism and Political Violence at the Center for Security Studies
(CSS) at ETH Zurich, Switzerland.

Sebestyn L. v. Gorka is the Founding Director of the Institute for Transitional Democracy and International
Security (ITDIS) Hungary, and the Director for Policy Studies at the Educational Initiative for Central and
Eastern Europe (EICEE), USA.

Beatrice de Graaf is Professor for the history of International Relations and Global Governance at Utrecht
University, The Netherlands.

Bob de Graaff is Socrates Foundation Professor for political and cultural reconstruction from a humanist
perspective at Utrecht University and former Director of the Centre for Terrorism and Counterterrorism at
Campus The Hague/Leiden University.

ISSN 2334-3745 177 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Stuart Groombridge holds a Masters of Justice (Strategic Intelligence) from Queensland University of
Technology, specialising in Organised Crime and recruitment methodologies utilised by Islamist Terrorist
Groups. He is currently a PhD candidate at the University of Wollongongs Centre for Transnational Crime
Prevention.

Rohan Gunaratna is the Head of the International Center for Political Violence and Terrorism Research at
Nanyang Technological University in Singapore.

Dipak K. Gupta was, until his retirement, Fred J. Hansen Professor of Peace Studies and Distinguished
Professor in Political Science, San Diego State University.

Abdulhadi Hairan is a Kabul-based researcher and security, governance and terrorism analyst.

Irm Haleem is an Assistant Professor in the Political Science Department at Seton Hall University, currently
researching and publishing on Islamist extremism in the Middle East, South Asia, Southeast Asia, Sub-
Saharan Africa and Europe.

Muhammad Haniff Hassan is an Associate Research Fellow at the S. Rajaratnam School of International
Studies, Nanyang Technological University, Singapore.

John Horgan is Director of the Center for Terrorism and Security Studies at the University of Massachusetts,
Lowell Campus.

Brian K. Houghton is an Associate Professor of Public Policy & Management at BYU-Hawaii, and the
former Director of Research at the Memorial Institute for the Prevention of Terrorism.

Russell Howard, a former US Army General, is currently at the Monterey Institute of Non-Proliferation
Studies.

Richard Jackson is founding editor of the journal Critical Studies on Terrorism.

Jolene Jerard is a Research Analyst at the International Center for Political Violence and Terrorism Research
(ICPVTR), a center of the S. Rajaratnam School of International Studies (RSIS) in Singapore.

George Joff teaches Middle Eastern and North African Affairs at the Centre of International Studies at the
University of Cambridge.

Ranga Kalansooriya is a journalist from Sri Lanka with wide experience in terrorism and political violence
and a PhD Candidate in journalism and political violence.

Jeffrey Kaplan is Associate Professor of Religion and Director of the University of Wisconsin Oshkosh
Institute for the Study of Religion, Violence and Memory.

Emmanuel Karagiannis is an investigator at the START center, University of Maryland, and a lecturer at the
University of Macedonia, Greece.

George Kassimeris is a Senior Research Fellow in Conflict and Terrorism at the University of
Wolverhampton and co-editor of the journal Critical Studies in Terrorism.

Robert E. Kelly is an Assistant Professor of Political Science in the School of International Studies at the
University of the Pacific.

Jesmeen Khan is a Research Analyst at the International Center for Political Violence and Terrorism

ISSN 2334-3745 178 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Research (ICPVTR), a centre of the S Rajaratnam School of International Studies (RSIS), Singapore.

Brian Kingshott is Professor of Criminal Justice at Grand Valley State University, USA.

Jorge Lasmar, is head of the Department of International Relations at the University of Minas, Brazil.

Faryal Leghari a researcher at the Gulf Research Center, UAE.

Ambassador Melvyn Levitsky is a retired Career Minister in the U.S. Foreign Service. He teaches
international relations at the University of Michigans Gerald R. Ford School of Public Policy and is Senior
Fellow of the Schools International Policy Center.

Pete Lentini is Co-founder and Director of the Global Terrorism Research Centre (GTReC), Monash
University, Australia. He is currently researching neo-jihadism; extremism and terrorism in Australia and
Russia.

Brynjar Lia is Associate Research Professor at the University of Oslo and also Adjunct Research Professor at
the Norwegian Defense Research Establishment (FFI). He is a historian by training.

Douglas Macdonald has taught at Colgate University for twenty years and Director of its International
Relations Program.

Lieutenant General Talat Masood served in the Pakistan Army for nearly 40 years with his last assignment
being Secretary for Defence Production in Ministry of Defence. Since retirement he is closely associated with
think- tanks and universities regionally and globally, working to promote peace and stability in the region.

William McCants is the founder of Jihadica and also co-founder of Insight Collaborative, a Washington,
D.C. -based company that provides education and expertise on Islamism.

Andrew McGregor is the Director of Aberfoyle International Security in Toronto, Canada.

George Michael is an Assistant Professor of Political Science and Administration of Justice at the University
of Virginias College of Wise.

Mansoor Moaddel is a Professor of Sociology at Eastern Michigan University, where he teaches sociology of
religion, ideology, revolution, Islam and the Middle East.

Fathali M. Moghaddam is Professor of Psychology at Georgetown University and author of Multiculturalism


and Intergroup Relations: Psychological Implications for Democracy in Global Context.

Gregory Miller is an Assistant Professor of Political Science at the University of Oklahoma and is one of the
Directors of the Summer Workshop on Teaching about Terrorism (SWOTT).

Will H. Moore is Associate Professor of Political Science at the Florida State University with research
interests in violent political conflict within and between countries.

Sam Mullins gained an MSc in Investigative Psychology from the University of Liverpool, and is currently
teaching at the Centre for Transnational Crime Prevention (CTCP) at the University of Wollongong,
Australia.

Kevin R. Murphy is Department Head and Professor of Psychology at Pennsylvania State University.

Brigitte L. Nacos is a journalist and Adjunct Professor of Political Science at Columbia University,
specialized in mass media, public opinion and decision-making; terrorism and counterterrorism. Blog

ISSN 2334-3745 179 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Peter Neumann is Director of the International Centre for the Study of Radicalisation and Political Violence.
Prior to this appointment, he was Director of the Centre for Defence Studies (20052007) at Kings College
London.

John M. Nomikos is Director of the Research Institute for European and American Studies (RIEAS).

Mariya Y. Omelicheva is an Assistant Professor at the University of Kansas.

Raffaello Pantucci is a researcher at the International Institute for Strategic Studies (IISS) in London, UK.

Alison Pargeter is a Senior Research Associate at the Centre of International Studies at the University of
Cambridge and a visiting scholar at Pembroke College.

Reuven Paz is a long-time researcher of radical Islam, and the founder and director of the Project for the
Research of Islamist Movements (PRISM) in Herzliya, Israel.

Gregory Pemberton is a graduate of the Royal Military College Duntroon and the University of Sydney and
is currently Manager of Postgraduate Programs of the Centre of Policing, Intelligence and Counter Terrorism
at Macquarie University.

Keli Perrin is the Assistant Director of the Institute for National Security and Counterterrorism at Syracuse
University.

James A. Piazza is Professor at the International Center for the Study of Terrorism, at Pennsylvania State
University.

Nico Prucha is Affiliated Researcher at the Austrian Institute for International Affairs (OIIP) and a Ph.D.
Candidate at the University of Vienna.

Gilbert Ramsay is a researcher at the Centre for the Study of Terrorism and Political Violence, University of
St. Andrews, Scotland where he is also a Teaching Assistant.

Muhammad Amir Rana is the Director of the Pakistan Institute for Peace Studies (PIPS), Islamabad,
Pakistan.

Magnus Ranstorp is the Research Director of the Centre for Asymmetric Threat Studies at the Swedish
National Defence College in Stockholm.

Xavier Raufer is a Professor at the EDHEC Business School in Paris, a Member of the Council on Global
Terrorism, and a Member of the Terrorism Studies Board of the Centre for the Study of Terrorism and
Political Violence.

Fernando Reinares is a Professor of Political Science and Security Studies, Universidad Rey Juan Carlos, and
Director of the Program on Global Terrorism, Elcano Royal Institute, Madrid.

Louise Richardson is Principal and Vice-Chancellor of the University of St. Andrews, Scotland.

Karl Roberts is a Forensic Psychologist, Principal Lecturer in Psychology at Sunderland University and a
consultant to UK police forces on risk assessment in terrorism and investigative skills for law enforcement.

Hanna Rogan is a Research Fellow and Ph.D. Candidate at the Norwegian Defence Research Establishment.

Johnny Ryan is a Senior Researcher at the Institute of International and European Affairs.

ISSN 2334-3745 180 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Alex P. Schmid is one of the three Directors of the Terrorism Research Initiative (TRI) and Editor-in-Chief
of its online journal Perspectives on Terrorism. He is a Fellow at the International Centre for Counter-
Terrorism in The Hague.

Richard J. Schmidt is an Associate Professor at the University of Nebraska with interests in intelligence
analysis, counterterrorism, terrorism and political violence.

Mark Sedgwick is an Associate Professor and Coordinator of the Unit for Arab and Islamic Studies at the
University of Aarhus, Denmark.

Abdel Aziz Shady is Director of the Terrorism Studies and Research Program at the Faculty of Economics
and Political Sciences at Cairo University, Egypt.

Stephen M. Shellman is a Research Scientist within the Institute for the Theory and Practice of International
Relations at the College of William & Mary and is Director of the Violent Intranational Political Conflict and
Terrorism (VIPCAT) Research Laboratory.

Dmitry Shlapentokh is an Associate Professor-Indiana University, South Bend and author of several books
and many articles.

Joshua Sinai is a Washington DC based educator and consultant; he is Book Reviews Editor of Perspectives
on Terrorism.

Stephen Sloan is Emeritus Professor and Fellow of the Global Perspectives Office of the University of Central
Florida.

Jeffrey Sluka is an Associate Professor in the Social Anthropology Programme at Massey University, New
Zealand.

John Solomon is global head of terrorism research for World-Check.

Guido Steinberg is a former advisor on international terrorism in the German Federal Chancellery.
Currently he is serving as Senior Fellow at the German Institute for International and Security Affairs
(Stiftung Wissenschaft und Politik, SWP) in Berlin, specializing in Middle East and Gulf Affairs.

Michael Stohl is Professor of Communication Studies at the University of California-Santa Barbara.

Nicole Stracke is a Researcher in the Department of Security and Terrorism Studies at the Gulf Research
Center, UAE.

Praveen Swami is Associate Editor for The Hindu and Frontline magazine in India.

Andrew T. H. Tan is an Associate Professor in Social Science and International Studies at the University of
New South Wales, Australia.

Manuel R. Torres Soriano is a professor of political science as the Universidad Pablo de Olavide de Sevilla,
Spain.

Peter Waldmann is Professor Emeritus of Sociology at the University of Augsburg, Germany, and a long time
member of the Advisory Board of the German Ministry of Development.

Carl Anthony Wege is professor of Political Science at the College of Coastal Georgia.

Leonard Weinberg is a Foundation Professor of Political Science at the University of Nevada.

ISSN 2334-3745 181 August 2014


PERSPECTI VES O N TERRORISM Volume 8, Issue 4

Clive Williams is an Adjunct Professor at PICT, a Visiting Professor at ADFA, and a Visiting Fellow at the
ANU; his specialised field is politically motivated violence.

Phil Williams is a Professor at the Graduate School of Public and International Affairs, University of
Pittsburgh. Currently he is a Visiting Research Professor at the Strategic Studies Institute, US Army War
College, Carlisle PA. His research interests include the relationship between organized crime and terrorism,
and terrorist finances.

Mark Woodward is an anthropologist and Islam specialist who teaches in the Department of Religious
Studies at Arizona State University.

David Wright-Neville is a former senior intelligence analyst with the Australian government and is now
Deputy Director of the Global Terrorism Research Centre and an Associate Professor at Monash University
in Melbourne, Australia, where his research and teaching focuses on the political psychology of terrorism and
counter-terrorism, especially in Southeast Asia.

Sherifa Zuhur is Director of the Institute of Middle Eastern, Islamic and Strategic Studies.

Legal Note: Perspectives on Terrorism (PT) hosts articles that reflect a diversity of opinions. The views
expressed therein, and the empirical evidence cited in their support, remain the sole responsibility of the
contributing authors; they do not necessarily reflect positions and views of the journals Editorial Team and
Editorial Board or PTs parent organizations, the Terrorism Research Initiative (TRI) and the Center for
Terrorism and Security Studies (CTSS).

ISSN 2334-3745 182 August 2014

You might also like