Terror on Repeat

2016 ◽  
Vol 26 (4) ◽  
pp. 316-336
Author(s):  
Marie Ouellet ◽  
Martin Bouchard

Criminal and terrorist organizations often depend on repeat offenders to maintain the group’s longevity, especially after repeated law enforcement interventions. Yet, little is known about the offenders who perpetrate multiple incidents on behalf of a group. Relying on data for 118 terrorist offenders involved across eight attacks from 2000 to 2005, this study examines the correlates of repeat offending within a terrorist organization. Our main predictor, criminal social capital, is measured by the number and structure of co-offending ties. Poisson regression results demonstrate that offenders with a higher number of connections are more likely to be involved in multiple attacks; while offenders positioned as brokers—bridging otherwise unconnected others—are less likely to reoffend. In addition, being a leader and graduate education was associated with repeat offending. These findings suggest that selection is based on more than an offender’s skill set but also on their embeddedness within the group.

Entropy ◽  
2021 ◽  
Vol 23 (10) ◽  
pp. 1334
Author(s):  
Alexandros Z. Spyropoulos ◽  
Charalampos Bratsas ◽  
Georgios C. Makris ◽  
Evangelos Ioannidis ◽  
Vassilis Tsiantos ◽  
...  

In recent years, law enforcement authorities have increasingly used mathematical tools to support criminal investigations, such as those related to terrorism. In this work, two relevant questions are discussed: “How can the different roles of members of a terrorist organization be recognized?” and “are there early signs of impending terrorist acts?” These questions are addressed using the tools of entropy and network theory, more specifically centralities (degree, betweenness, clustering) and their entropies. These tools were applied to data (physical contacts) of four real terrorist networks from different countries. The different roles of the members are clearly recognized from the values of the selected centralities. An early sign of impending terrorist acts is the evolutionary pattern of the values of the entropies of the selected centralities. These results have been confirmed in all four terrorist networks. The conclusion is expected to be useful to law enforcement authorities to identify the roles of the members of terrorist organizations as the members with high centrality and to anticipate when a terrorist attack is imminent, by observing the evolution of the entropies of the centralities.


Author(s):  
Farhan Zahid

Pakistan remains a country of vital importance for Al-Qaeda. It is primarily because of Al-Qaeda’s advent, rise and shelter and not to mention the support the terrorist organization found at the landscape of Pakistan during the last two decades. The emergence of in Pakistan can be traced back to the Afghan War (1979-89), with a brief sabbatical in Sudan the Islamist terrorist group rose to gain prominence after shifting back to Afghanistan. It then became a global ‘Islamist’ terrorist entity while based in neighboring Afghanistan and found safe havens in the erstwhile tribal areas of Pakistan in the aftermath of the US invasion of Afghanistan in 2001. Prior to its formation in 1988 in Peshawar (Pakistan), it had worked as Maktab al-Khidmat (Services Bureau) during the Afghan War.2 It had its roots in Pakistan, which had become a transit point of extremists en route to Afghanistan during the War. All high profile Al-Qaeda leaders, later becoming high-value targets, and members of its central Shura had lived in Pakistan at one point in their lives. That is the very reason the Al-Qaeda in Pakistan is termed as Al-Qaeda Core or Central among law enforcement practitioners and intelligence communities. Without going into details of Al-Qaeda’s past in Pakistan the aim of this article is to focus on its current state of affairs and what future lies ahead of it in Pakistan.


2020 ◽  
Vol 23 (4) ◽  
pp. 745-750
Author(s):  
Spyridon Repousis

Purpose The purpose of this paper is to research for possible interconnection of the Greek terrorist organization “November 17” with the international terrorist Ilich Ramirez Sanchez or “Carlos the Jackal.” Design/methodology/approach In this research are discussed documents, visits by Carlos and his team to Greece, operational support through training and supply of weapons to “ELA” and “November 17,” attacks on foreign service targets in Greek territory, reports of close people working with Greek terrorist organizations, terrorist proclamations and interrogation of Carlos. Findings Available data indicate their cooperation and their terrorist murderous activity in Greece, which of course needs deeper investigation. “Carlos the Jackal” acted and cooperated in Greece with the two major terrorist organizations, “ELA” and “November 17,” causing material damages and murders. Practical implications The research is useful for government authorities, law authorities and offices and the democratic society as a whole. Originality/value To the best of the author’s knowledge, this is the first study examining the specific topic.


Author(s):  
Владислав Красинский ◽  
Vladislav Krasinskiy ◽  
Владислав Машко ◽  
Vladislav Mashko

The directory contains information on the international terrorist organizations al-Qaida, the Islamic state, Jabhat al-Nusra, the Islamic movement of Uzbekistan, the Taliban, Hizb ut-Tahrir al-Islami, the Union of Islamic Jihad, the Jund al-sham, the Muslim Brotherhood and the international religious extremist organization Tablighi Jamaat, which are banned in the territory of the Russian Federation. The authors considered the most famous and capable terrorist organization, revealed their operational capacity, the doctrines of, the organization and tactics of the activity, their role and place in the conglomeration of international terrorist organizations. The book is intended for law enforcement officers, analysts of research funds, political scientists and media representatives, as well as for a wide range of readers and experts interested in topical issues of countering international terrorism.


2020 ◽  
Vol 40 (2) ◽  
pp. 243-247
Author(s):  
Wadie E. Said

Abstract With Islamophobia rife and the government list of foreign terrorist organizations (FTOs) telling us who is a threat, marginalized populations are being targeted and can expect a hostile and negative prosecutorial outcome. The large majority of terrorism prosecutions center on material support charges, which by their very structure concentrate on FTOs that are largely Islamist in ideology. Attaching a terrorist taint to a population based on its religious affiliation generates a kind of self-perpetuating law enforcement bias and prosecutorial outcome. Such police state tactics and assumptions only assure the adverse results of insisting that an exceptional status applies to those accused of terrorist activity or support for it. That, in the government's eyes, those individuals stem from one of the major monotheistic faiths in large part, seems to be a foregone conclusion that continues to affect the law's development in largely negative ways.


2016 ◽  
Vol 13 (2) ◽  
pp. 231-246 ◽  
Author(s):  
Jerome H. Kahan

Abstract Nine days after the transformational 9/11 attacks, President G.W. Bush proclaimed that the nation is fighting a Global War on Terror (GWOT), an attention-grabbing phrase designed as a rallying cry for America to win the battle against al Qaeda and other terrorist organizations threatening our homeland as well as our allies and interests abroad. Eight years later, President Obama inherited what had become an even more dangerous situation, which led to the unexpected and courage attack that felled bin Laden and splintered al Qaeda. However, this success was short-lived when the Islamic State of Iraq and Syria (ISIS) suddenly emerged as our primary terrorist adversary – a new and brutal threat that President Obama vowed to “degrade and ultimately destroy” by doing what it takes to win the war against this and other terrorist organizations. While there has been some progress in halting and reversing ISIS territorial gains with the US providing support to newly trained Iraqi forces, this terrorist organization is not fully contained and far from being destroyed.


2020 ◽  
Vol 26 (6) ◽  
pp. 569-572
Author(s):  
Josie J Sivaraman ◽  
Stephen W Marshall ◽  
Shabbar I Ranapurwala

The aim of this study was to assess the association between state firearm legislation and law enforcement–related deaths (LEDs) and its modification by race. We used secondary data from an ecological cohort of 16 states (2010 to 2016), using the National Violent Death Reporting System (NVDRS), the State Firearm Law Database and additional public sources. Poisson regression with generalised estimating equations and inverse probability of exposure weights to account for time-varying confounding were used to quantify the association. LEDs were also disaggregated by race (Black vs non-Black). A total of 1593 LEDs took place during the 6-year study period. After adjusting for confounders, the IRR among non-Blacks was 0.48 (95% CI 0.26 to 0.89) and 1.53 (95% CI 0.93 to 2.54) among Blacks. Our findings highlight the fact that increased firearm provisions may decrease rates of LED among non-Black American individuals—an association not observed among Black Americans.


2021 ◽  
pp. 193672442110587
Author(s):  
S. Marlon Gayadeen ◽  
Scott W. Phillips ◽  
James J. Sobol

Since the 1960s, there has been well-documented incidents of the scholar-practitioner tension within policing research. Though there has been maturation in the professional partnership over the years, hindrances persist. The current study aims to advance collaborative efforts between the academic and law enforcement communities. Data for the current study derived from written documents and interviews. Results indicate that one individual, who possesses the appreciative cultural and social capital, can successfully mobilize collaborative research agendas between academics and police officers. These forms of capital (i.e., cultural and social) offer a new outlook on negotiating the obstacles that inhibit successful research collaboration between both professions. For new policing scholars, who have minimal connections with law enforcement, findings in the current study may serve as a recipe of sorts to better understand the practitioners to identify in collaborative research endeavors.


2009 ◽  
Vol 42 (01) ◽  
pp. 46-79 ◽  
Author(s):  
Geoffrey Corn ◽  
Eric Talbot Jensen

Transnational armed conflicts have become a reality. The increasing sophistication of terrorist organizations, their increasingly transnational nature, and their development of military strike capabilities, push and will continue to push States to resort to combat power as a means to defend against this threat. Relying on the factual fiction that the acts of such terrorists must be attributable to the States from which they launch their operations, or on the legal fiction that the use of military combat power to respond to such threats is in reality just extraterritorial law enforcement, fails to acknowledge the essential nature of such operations. Because these operations invoke the authority of the LOAC, they should and must be treated as armed conflicts.LOAC principles must be identified and must be broad enough to provide the authority necessary to bring the transnational enemy to submission while ensuring that that authority does not override fundamental humanitarian protections for victims of war: This Article proposes three essential pillars of this regulatory foundation: military necessity, targeting (object/distinction and proportionality), and humane treatment. These principles provide the balance between authority and obligation that is so essential for the effective and disciplined application of combat power Like the treatment of internal armed conflict, these pillars can form a foundation for a more comprehensive treatment of regulatory analysis, encompassing other issues such as command responsibility, criminal liability, access to judicial review, perfidy and treachery, and medical obligations.


Sign in / Sign up

Export Citation Format

Share Document