Studying the Families of Those Joining Terrorist Organizations: The Case of the PKK Terrorist Organization

2020 ◽  
Vol 20 (2) ◽  
Author(s):  
Mutlu Koseli ◽  
Ishak Celik
2020 ◽  
Vol 23 (4) ◽  
pp. 745-750
Author(s):  
Spyridon Repousis

Purpose The purpose of this paper is to research for possible interconnection of the Greek terrorist organization “November 17” with the international terrorist Ilich Ramirez Sanchez or “Carlos the Jackal.” Design/methodology/approach In this research are discussed documents, visits by Carlos and his team to Greece, operational support through training and supply of weapons to “ELA” and “November 17,” attacks on foreign service targets in Greek territory, reports of close people working with Greek terrorist organizations, terrorist proclamations and interrogation of Carlos. Findings Available data indicate their cooperation and their terrorist murderous activity in Greece, which of course needs deeper investigation. “Carlos the Jackal” acted and cooperated in Greece with the two major terrorist organizations, “ELA” and “November 17,” causing material damages and murders. Practical implications The research is useful for government authorities, law authorities and offices and the democratic society as a whole. Originality/value To the best of the author’s knowledge, this is the first study examining the specific topic.


2016 ◽  
Vol 13 (2) ◽  
pp. 231-246 ◽  
Author(s):  
Jerome H. Kahan

Abstract Nine days after the transformational 9/11 attacks, President G.W. Bush proclaimed that the nation is fighting a Global War on Terror (GWOT), an attention-grabbing phrase designed as a rallying cry for America to win the battle against al Qaeda and other terrorist organizations threatening our homeland as well as our allies and interests abroad. Eight years later, President Obama inherited what had become an even more dangerous situation, which led to the unexpected and courage attack that felled bin Laden and splintered al Qaeda. However, this success was short-lived when the Islamic State of Iraq and Syria (ISIS) suddenly emerged as our primary terrorist adversary – a new and brutal threat that President Obama vowed to “degrade and ultimately destroy” by doing what it takes to win the war against this and other terrorist organizations. While there has been some progress in halting and reversing ISIS territorial gains with the US providing support to newly trained Iraqi forces, this terrorist organization is not fully contained and far from being destroyed.


2006 ◽  
Vol 6 (1) ◽  
Author(s):  
Satya P Das ◽  
Sajal Lahiri

This paper develops a model of terrorist activity and behavior. A terrorist organization chooses the size and the number of attacks. The defending state chooses the level of security-deterrence measures. The equilibrium sequence is such that the Organization moves first, followed by the State. A defensive policy such as an innovation in security-deterrence technology tends to reduce the size of attacks but increase their number, while an offensive policy, lowering the total "strike" or "output" potential of a terrorist organization, has opposite effects. Both policies reduce the expected damage from terror. An individual's decision to become a terrorist or a financier is also modeled, leading to endogenous supplies of terrorists and funds. The effects of terrorist-flushing measures, provisions to curb the flow of funds to terrorist organizations and income-enhancing policies are evaluated by taking into account their "supply-side" effects.


Author(s):  
Светлана Бовдилова ◽  
Svetlana Bovdilova ◽  
Елена Матвеева ◽  
Elena Matveeva

The spread and expansion of the influence of international terrorist organizations on a global scale keep this phenomenon in the focus of academic interest. And it is not without reason that in the last few years the world’s attention has been drawn to the issue of war on terrorism and extremism, the global problems of mankind at the beginning of XXI century. The aim of this article is comprehension of the phenomenon of national discrimination that took place at the beginning of XX century in Nazi Germany in the form of Holocaust and has resurged in the activity of the Middle-East terrorist organization ISIL as means of fight against all infidels. The authors come to the conclusion that at the bottom of functioning of the Third Reich and the ISIL there are common ideological tenets concerning the methods of state establishing and the system of its further functioning. The main tools of such states are violence and physical extermination of the people on national and religious grounds as well as application of terror methods against civilian population.


2006 ◽  
Vol 31 (1) ◽  
pp. 7-48 ◽  
Author(s):  
Audrey Kurth Cronin

Al-Qaida will end. The fear that a small terrorist organization with a loose network has transformed itself into a protracted global ideological struggle without an end in sight is misguided. There are centuries of experience with modern terrorist movements, many bearing important parallels with al-Qaida; yet the lessons arising from the demise of these groups are little studied. Unfortunately, terrorist organizations in their final stages are often at their most dangerous. The outcomes can range from implosion of a group and its cause to transition to astonishing acts of violence and interstate war. Comparing al-Qaida's differences and similarities with those of earlier terrorist organizations, and applying relevant lessons to this case, can provide insights into al-Qaida's likely demise. It can also inform thinking about how to manage and hasten al-Qaida's end.


2013 ◽  
Vol 65 (2) ◽  
pp. 238-269
Author(s):  
Aleksandar Jazic

The author analyses the key features of left-wing terrorism through the Red Brigades, a terrorist organization formed in Italy in the late 1960s. The complex situation in the country after World War II and the changes in international relations had caused the formation of this terrorist organization. The Red Brigades sought a complete transformation of the Italian society in line with the ideology of Marxism-Leninism. This terrorist organization was engaged in many terrorist activities and the most common targets were big capital owners and political officials. After World War II, West Germany had had the same problem as Italy, which prompted the formation of another terrorist organization - the Red Army Faction based in this country. The Red Army Faction acted in line with the same ideological principles and pursued the same goals as the Red Brigades, which resulted in close cooperation between the two. Both organizations established cooperation with other terrorist organizations around the world. After the Cold War, the activities of these organizations weakened and progressively disappeared. Meanwhile, radical Islamic terrorist organizations emerged basing their actions on religious grounds. However, there are some similarities and differences between Islamic and left wing terrorist organizations.


Author(s):  
Andrey Suleimenov

The subject of this research is the key topoi of the discourse of Islamist propaganda and the mechanism of their representation by a number of unaccredited sources of the Russian-language extremist propaganda. The object of this research is the Islamist discourse covered by the “official” sources of the prohibited in the Russian Federation international terrorist organizations – “Islamic State”, “Dabiq” and “Rumiyah”, as well as a number of Russian-language sources of Islamist propaganda. The author examines such aspects of jihadist propaganda as the category of space, semiotics of Islamist propaganda; postmodern traits in the jihadist propaganda materials. Analysis is conducted on the category “Dawlah” (“state” from Arabic) as a sovereign concept in the discourse of “Islamic State” organization. Special attention is paid to the characteristic of Islamist propaganda as a phenomenon typical for the era of postmodernism. The distinctive features of the Russian-language Islamist discourse are described. Leaning on the analysis of textual and visual materials of Islamist propaganda, the author concludes on inextricable connection of the discourse of jihadist propaganda with the society of its function, despite the thesis on irreconcilable confrontation to the “Taghut” society declared by the ideologists of the international terrorist organization “Islamic State”. This thesis is proven by a certain symbolic set of Islamist propaganda, usage of symbols comprehensible to modern audiences, and significant attention given to the brand and style of the jihadists. After the defeat of the Caliphate as a proto-state entity (rather than a terrorist organization), the “Islamic State” substantially migrated into the virtual space. In an attempt to influence the audience, jihadist propaganda operates not only on the level of objective reality, but immerses the reader in an entirely virtual world. This work reveals the peculiarities of such process.


2021 ◽  
Vol 9 ◽  
Author(s):  
Jun Hu ◽  
Chengbin Chu ◽  
Ling Xu ◽  
Peng Wu ◽  
Hui-jia Lia

The past years have witnessed increasingly widespread terrorism, violently destroying world peace and regional prosperity. Therefore, uncovering terrorist plots has become the most crucial step for eliminating terrorist attacks. However, with the terrorist scheme being disguised under the huge amount of data flow on the internet, identifying terrorist organizations still remains challenging. Since many terrorist organizations are prone to launch terrorist attacks together, here, we model their relationships as a Terrorist Organization Alliance (TOA) network and propose a novel method to identify the key terrorist organizations in the TOA network. The TOA network utilizes existing key nodes in order to extract useful information, and, with the help of the entropy weight method, the new solution to the TOA network is effective and precise. The experiments are performed on the dataset from the Global Terrorism Database, and the results are statistically validated through t-tests and convergence analysis. Compared with the traditional methods, our method is proven to be superior in terms of measure the harm of terrorist attack organizations and find the key terrorist organizations.


2019 ◽  
Vol 11 (5) ◽  
pp. 1487 ◽  
Author(s):  
Xueli Hu ◽  
Fujun Lai ◽  
Gufan Chen ◽  
Rongcheng Zou ◽  
Qingxiang Feng

Terrorist attacks are events which hinder the development of a region. Before the terrorist attacks, we need to conduct a graded evaluation of the terrorist attacks. After getting the level of terrorist attacks, we can fight terrorist organizations more effectively. This paper builds rating models for terrorist attacks, hidden or emerging terrorist organization classification discovery models, terrorist organization alliance network models and more, through quantitative research of the Global Terrorism Database, which solved the event classification. Through studying relevant literature and the variables of the Global Terrorism Database, this paper sorted out 25 observation variables related to the impact level (level of harm) of terrorist attacks. By establishing a mathematical model of factor analysis, 11 factors related to the impact level (level of harm) of terrorist attacks were constructed, and the variance of the contribution of each factor was used as the weight to calculate the comprehensive rate of the impact level of each terrorist attack. Finally, K-means clustering method is used to cluster and analyze the comprehensive rate of impact level, and the top 10 terrorist attacks with the highest impact level in the past two decades were obtained.


Sign in / Sign up

Export Citation Format

Share Document