scholarly journals Multi-modal Networks Reveal Patterns of Operational Similarity of Terrorist Organizations

Author(s):  
Gian Maria Campedelli ◽  
Iain Cruickshank ◽  
Kathleen M. Carley
2017 ◽  
Vol 36 (04) ◽  
pp. 245-250
Author(s):  
A. Speckhard

SummaryAs a terror tactic, suicide terrorism is one of the most lethal as it relies on a human being to deliver and detonate the device. Suicide terrorism is not confined to a single region or religion. On the contrary, it has a global appeal, and in countries such as Syria, Iraq, Afghanistan, and Pakistan it has come to represent an almost daily reality as it has become the weapon of choice for some of the most dreaded terrorist organizations in the world, such as ISIS and al-Qaeda. Drawing on over two decades of extensive field research in five distinct world regions, specifically the Middle East, Western Europe, North America, Russia, and the Balkans, the author discusses the origins of modern day suicide terrorism, motivational factors behind suicide terrorism, its global migration, and its appeal to modern-day terrorist groups to embrace it as a tactic.


2020 ◽  
Vol 10 (5) ◽  
pp. 134-140
Author(s):  
MAKSIM SHKVARUN ◽  
◽  
SEJRAN ISKENDEROV

The subject of the research is the degree of influence of Sunni and Shi’ism on political processes in Arab countries. The object of the research is Islam as the legal basis of the state. The authors examine in detail such aspects of the topic as the historical analysis of the origin of Islam, the reasons for the division of Islam into Sunnis and Shiites, a comparative analysis of the two branches of Islam, the peculiarities of the legal schools of Islam, the interaction of Sunnis and Shiites with state power. Particular attention is paid to the analysis of interpretations (kalams) of the Qur’an and Sunnah. The study is fundamental and is aimed at the historical and political analysis of Islam in the XXI century. The relevance of this topic is confirmed by numerous studies of the described problems. The main conclusions of the study are that one of the key problems in the Arab states is the issue of the origin of power, which remains relevant even in the XXI century. The authors’ special contribution to the study of the topic is the hypothesis that the radicalism of Islam is associated with its short history in comparison with Christianity. Thus, Islam in the XXI century. is still at an active stage of formation, which leads to the emergence of Islamic terrorist organizations. The novelty of this scientific study lies in the consideration of historical processes in the political discourse of the XXI century.


2020 ◽  
Vol 18 (1) ◽  
pp. 119-136
Author(s):  
Arkadiusz Machniak ◽  

A COIN operation involves both insurgents and local people. Its main goal is to neutralize all conditions enabling the development of insurgent movements or conducive to their development. In COIN operations, the basic efficiency criterion is the destruction or significant reduction of the opponent’s effectiveness and its ability to use local people for its own purposes. Military counterintelligence is responsible for analyzing the capabilities and organizational structure of the enemy’s reconnaissance system, including terrorist organizations or rebels, and planning undertakings that neutralize enemy activities, achieved, among others by recognizing its capabilities and taking remedial action on this basis. Anti-partisan operations constitute a coordinated effort to combat guerrilla activities in the theatre of war of a varied military, paramilitary, political, economic, psychological, and social character, aimed against insurgents and against their impact on the state and the society.


Author(s):  
Hind Mohammed Abdul Jabbar Ali

Connecting to the  electronic information network (internet) became the most characteristic that distinguish this era However , the long hours which young men daily spend on the internet On the other hand ,there are many people who are waiting for the chance to talk and convince them with their views This will lead the young people to be part in the project of the “cyber armies “that involved with states and terrorist organizations  This project has been able  to recruitment hundreds of people every day to work in its rank . It is very difficult to control these websites because we can see the terrorist presence in all its forms in the internet   In addition there are many incubation environments that feed in particular the young people minds                                                                                         Because they are suffering from the lack of social justice Also the unemployment, deprivation , social and political repression So , that terrorist organizations can attract young people through the internet by convincing them to their views and ideas . So these organizations will enable to be more  stronger.


Author(s):  
Renate Mayntz

The study of illegal markets needs to distinguish illegality from legality, and to relate both to legitimacy. There is no conceptual ambiguity about the distinction between legal and illegal if legality is formally defined. In practice, (formal) legality and (social) legitimacy can diverge: illegal markets are empirically related to organized crime, mafia, and even terrorist organizations, and they interact both with legal markets and the forces of state order. Where legal and illegal action systems are not separated by clear social boundaries, they are connected by what has come to be called “interfaces”: actors moving between a legal and an illegal world, and grey zones of actions that are neither clearly legal or illegal, nor clearly legitimate or illegitimate. Interfaces facilitate interaction between legal and illegal action systems, but they are also sources of tension and can lead to institutional change.


2009 ◽  
Vol 54 (2) ◽  
pp. 303-330 ◽  
Author(s):  
S. Brock Blomberg ◽  
Rozlyn C. Engel ◽  
Reid Sawyer

Complexity ◽  
2019 ◽  
Vol 2019 ◽  
pp. 1-13
Author(s):  
Cristina Sánchez-Rebollo ◽  
Cristina Puente ◽  
Rafael Palacios ◽  
Claudia Piriz ◽  
Juan P. Fuentes ◽  
...  

Social networks are being used by terrorist organizations to distribute messages with the intention of influencing people and recruiting new members. The research presented in this paper focuses on the analysis of Twitter messages to detect the leaders orchestrating terrorist networks and their followers. A big data architecture is proposed to analyze messages in real time in order to classify users according to different parameters like level of activity, the ability to influence other users, and the contents of their messages. Graphs have been used to analyze how the messages propagate through the network, and this involves a study of the followers based on retweets and general impact on other users. Then, fuzzy clustering techniques were used to classify users in profiles, with the advantage over other classifications techniques of providing a probability for each profile instead of a binary categorization. Algorithms were tested using public database from Kaggle and other Twitter extraction techniques. The resulting profiles detected automatically by the system were manually analyzed, and the parameters that describe each profile correspond to the type of information that any expert may expect. Future applications are not limited to detecting terrorist activism. Human resources departments can apply the power of profile identification to automatically classify candidates, security teams can detect undesirable clients in the financial or insurance sectors, and immigration officers can extract additional insights with these techniques.


Sign in / Sign up

Export Citation Format

Share Document