Drivers of Jihadist Terrorism: Understanding the Ideological Antecedents of Salafi-Jihadi Terrorism

2019 ◽  
Author(s):  
Shiraz Maher
Keyword(s):  
2019 ◽  
pp. 177-186
Author(s):  
Johan Leman ◽  
Stef Janssens

Author(s):  
Maximiliano Emanuel Korstanje ◽  
Babu George

The present chapter posits an interesting discussion revolving around the term Thana Capitalism, which was originally formulated in earlier works. Originally formulated to serve as an opposite alternative against neo-pragmatism, neoliberalism toyed with the belief that the world can be united through the consumption and free trade. During 80s and 90s decades, the theory of development adopted tourism as an efficient instrument to struggle with poverty. Under the auspices of neoliberalism, modern tourism not only paved the ways for an “Kantian eternal peace,” but also conducted a much deeper process of democratization beyond the borders of Western civilization. After the recent, stock market crisis in 2008, tourism not only was placed in jeopardy by the advance of jihadist terrorism but mutated towards more morbid forms of consumption, which made from human suffering as a tantalizing criterion of attraction. Thana-Tourism, War tourism, Dark Tourism or slum tourism are indicators that the society is changing towards new horizons.


2018 ◽  
Vol 1 (102) ◽  
pp. 305
Author(s):  
Rosario Serra Cristóbal

Resumen:La gestión coordinada de las fronteras y el funcionamiento eficaz de los sistemas de tratamiento de datos de circulación de personas pueden servir como mecanismo de alerta temprana frente al riesgo de ataques terroristas. Puede fortalecer la capacidad colectiva de los Estados para detectar, prevenir y combatir el terrorismo al facilitar el intercambio oportuno de información, permitiendo así adoptar de forma responsable decisiones cruciales.Este trabajo analiza los concretos instrumentos de gestión de datos en fronteras que pueden ser útiles en la lucha antiterrorista, porque el primer paso en inteligencia reside en la obtención de información, que luego será analizada y tratada para convertir esa información en conocimiento. Como tendremos oportunidad de comprobar, muchas de las bases de datos en fronteras se crearon para controlar la entrada de inmigrantes en las fronteras europeas, pero la información que ofrecen dichos sistemas puede servir también para luchar contra ese reto que nos amenaza, el del terrorismo yihadista. No obstante, este trabajo subraya que se trata de fenómenos distintos.Es cierto que la nueva oleada de ataques yihadistas ha coincidido, en el mismo espacio temporal, con la mayor crisis migratoria a la que se ha tenido que enfrentar Europa debido a crisis humanitarias y posteriormente a la guerra de Siria u otros conflictos. Pero, no son lo mismo. El terrorismo yihadista y la inmigración poco o nada tienen que ver, por mucho que se hayan querido vincular o se hayan pretendido justificar determinadas políticas contra la inmigración como algo necesario para luchar contra el terrorismo yihadista, con el fácil argumento de que frenando la inmigración se evita la entrada de potenciales terroristas en Europa.El trabajo advierte del riesgo de que la lucha contra el terrorismo sea utilizada para reforzar los controles de personas en las fronteras con el verdadero objetivo de frenar los flujos migratorios. Al tiempo, subraya la necesidad de que en dichos controles se sigan directrices y prácticas claras y se respeten plenamente las obligaciones que los Estados tienen de conformidad con el Derecho internacional, tal como ha recordado el Tribunal Europeo de Derechos Humanos y el Tribunal de Justicia de la Unión Europea. De hecho, no son pocos los casos en los que estos Tribunales han subrayado la relevancia indubitada de principios como la reserva de ley, la necesidad o la proporcionalidad como sustrato de la licitud de muchas medidas que incluyen el tratamiento de datos personales.Summary:1. Jihadist terrorism as a cross-border phenomenon. 2. The benefit of data exchange on crossing-borders in the Schengen area. 3. New guidelines on data processing and the safeguard of national security. 4. The register of passengers (The Personal Name Record or PNR). 5. When the data cross the external borders. The exchange of data with third countries. 5.1. The failed PNR Agreement with Canada and the EU Court of Justice’s standards regarding the transfer of passengers’ data. 5.2. The exchange of data with the United States. The EU-US Umbrella Agreement and the Privacy Shield. 6. The use of profiles and blacklists of alleged terrorists in cross-bording. 7. ConclusionsAbstract:EU Coordinated border management and effective functioning of data processing systems related to the movement of persons may serve as an early warning mechanism against the risk of terrorist attacks. It can strengthen the collective capacity of States to detect, prevent and combat terrorism by facilitating the timely exchange of information, thereby enabling crucial decisions to be adopted in a responsible manner.This paper analyzes the concrete border data management tools that can be useful in the fight against terrorism. The first step in intelligence lies in obtaining information, which will then be analyzed and treated to turn that information into useful knowledge. As we will have an opportunity to verify, numerous border databases were created to control the entry of immigrants into European borders, but the information offered by these systems can also serve to fight against this challenge that threatens us, that of jihadist terrorism.Nevertheless, we emphasize that terrorism and immigration are different phenomena. The truth is that the new wave of Jihadist attacks took place along the largest migratory crisis that Europe faced due to different humanitarian crises and to the war in Syria and other conflicts. But they represent different realities. Jihadist terrorism and immigration have little or nothing in common. In spite of this, many wish to link both with a view to justify certain anti-immigration policies as necessary actions for coping with Jihadist terrorism. This has been done based on a simple narrative: holding back immigration prevents the entry of potential terrorists in Europe.This paper shows that the risk that the fight against terrorism will be used as a basis to reinforce people controls at the borders, while the true objective of these measures is to curb migratory flows. At the same time, it underlines the need for clear guidelines and practices to be followed when implementing such controls. It also vindicates the need for States to observe their obligations laid down by international law, as recalled by the European Court of Human Rights and the EU Court of the Justice. In fact, in many cases, these jurisdictions highlighted the undoubted relevance of the statutory reserve principle, the principle of necessity or the principle of proportionality, as legal basis for the adoption of measures that include personal data processing.


2016 ◽  
Vol 22 (4) ◽  
pp. 357-364 ◽  
Author(s):  
Jean-Paul Azam ◽  
Mario Ferrero

AbstractThe Herostratos syndrome affects some people who perpetrate odious attacks for the sake of infamy. We suggest that this sheds some useful light to explain the wave of mass killing going on in Europe and North America, including school shootings and Jihadist terrorism, within a game-theoretic framework. The analysis points out that policies aimed at countering this type of violence should focus on trivializing these attacks and reducing the publicity that they get in the media.


2007 ◽  
Vol 19 (4) ◽  
pp. 571-592 ◽  
Author(s):  
Rogelio Alonso ◽  
Marcos García Rey
Keyword(s):  

Author(s):  
Juan Luis De León Azcárate

<p>The present study analyzes the meaning of the concept of jihad in the Qur’an, the main foundational text of Islam, and its treatment of violence and war. The study emphasizes the need to understand the foundational texts considered sacred, taking into account the historical context in which they arose, and concludes that the quranic rules on jihad and war participate in a religious-inspired humanitarianism that differs fully from the practices of jihadist terrorism.</p><p><strong>Received</strong>: 11 June 2018<br /><strong>Accepted</strong>: 15 September 2018<br /><strong>Published online</strong>: 11 December 2018</p>


Sign in / Sign up

Export Citation Format

Share Document