Journal articles on the topic 'Terrorists – Recruiting'

To see the other types of publications on this topic, follow the link: Terrorists – Recruiting.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Terrorists – Recruiting.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kim, Eun Young, and Min Woo Yun. "Islamic terrorists propaganda in cyberspace." Korean Association of Criminal Psychology 18, no. 2 (June 30, 2022): 37–50. http://dx.doi.org/10.25277/kcpr.2022.18.2.37.

Full text
Abstract:
Today, the cyberspace became a very important battle field of psychological warfare where terrorist groups are spreading propaganda, recruiting terrorists, and justifying their violent terror attacks. However, there are still a lack of literature investigating terrorist propaganda in cyberspace as a cyber warfare. Therefore, this study explores recent propaganda activities of terrorists in cyber space, its influence on the followers in social network, and countermeasure efforts. The findings of this study suggest that the wining of the new battle field becomes one of the most imminent and important tasks for military, intelligence communities, and counterterrorism authorities. In conclusion, the authors discuss academic and policy implications of the findings and suggest future research directions.
APA, Harvard, Vancouver, ISO, and other styles
2

Vasnetsova, Anastasiya Sergeevna. "Criminological characteristics of the heads of organized crime groups related to terrorism (the first stage of criminological research)." Полицейская деятельность, no. 6 (June 2020): 37–63. http://dx.doi.org/10.7256/2454-0692.2020.6.34318.

Full text
Abstract:
One of the most widespread directions of counterterrorism efforts is a targeted influence on the potential terrorists before they actually start their terrorist activity. To perform this complicated task, it is necessary to have the exact information about the characteristics of such personalities, which can be collected only by means of scientific interpretation of various significant data. It can help to find out what factors promote the formation of a personality of a terrorist and choose the measures aimed at their elimination thus preventing terrorist organizations from recruiting new members. The author studies such factors as the motive and the circumstances characterising the personality of a convict, which are subject to proving in the course of criminal proceedings according to part 1, article 73 of the Criminal Procedure Code of the Russian Federation. The author formulates the following conclusions: crimes of terrorism are ususally committed by young men (under the age of 30) with a low level of education; the increase of immigration to the Russian Federation leads to the increase of the number of the members of international terrorist organizations in the country; the reasons and  conditions leading to terrorist crimes are not being studied sufficiently enough; there is an interrelation between the criminological characteristics of terrorists’ personalities and the mechanisms of their involvement into terrorist activity, and the specificity of the roles performed by them in an organized crime group; the social sphere of regular terrorists is narrow, which determines their susceptibility to the terrorist ideology.   
APA, Harvard, Vancouver, ISO, and other styles
3

Tanuwijaya, Fanny, and Sunardi Sunardi. "MENGGALAKKAN DEKONSTRUKSI TERHADAP BIBIT-BIBIT TERORISME DI INDONESIA." Yurispruden 1, no. 1 (January 24, 2018): 71. http://dx.doi.org/10.33474/yur.v1i1.738.

Full text
Abstract:
ABSTRACTTerrorism is one of extraordinary crimes. The extraordinary of this crime is not only because it can cause serious impacts on the community life in general, but it also because of its ability to establish regeneration. This terrorist organization is quite successful in recruiting new members. This effectively encourages the willingness and the commitment of their members in conducting serious crimes in relation to terrorists conducts. In this circumstance, it is quite reasonable that all parties are encouraged to respond critically by deconstructing those terrorists’ regenerations. Keywords: Terrorism, Regeneration, Deconstruction, Society, Nation ABSTRAKTeroris merupakan salah satu jenis kejahatan isimewa (extraordinary crime). Keistimewaan kejahatan ini bukan semata disebabkan dampaknya yang serius terhadap kehidupan bermasyarakat dan berbangsa, tetapi juga dari sepek kemampuannya dalam membangun regenerasi. Organisasi teroris ini tergolong sukses dalam melakukan pembimbitan kader, sehingga untuk menjalankan modus operandi yang tergolong mengerikan, ada saja kader yang mau melaksanakannya. Berdasarkan kondisi ini, logis jika semua pihak dituntut melakukan dekonstruksi terhadap kaderisasi teroris.Kata Kunci: Terorisme, Kaderisasi, Dekonstruksi, Masyarakat, Negara.
APA, Harvard, Vancouver, ISO, and other styles
4

Khokhlov, I. "Some Approaches to Interpretation of Terrorism Phenomenon." World Economy and International Relations, no. 5 (2015): 19–28. http://dx.doi.org/10.20542/0131-2227-2015-5-19-28.

Full text
Abstract:
In this work the author discusses certain motivation aspects of the lower- and medium-level members of terrorist networks. It should be noted that the analysis of drivers for terrorist activity cannot be reduced to a single factor; in each case, a range of reasons, often interdependent and complementary, should be taken into account, as well as social, political and economic conditions "favorable" for the development of terrorism. Since the 1990s, and especially after 9/11, the studies of terrorism became more and more relevant. In this period, enormous research has been conducted regarding the logistics of a terrorist network, recruiting techniques and terrorist finance tracking. It has to be said that such research has greatly influenced the methods used today to fight terrorists in deep hiding. However, despite the ample analysis, scholars often miss one of the key elements of terrorism – the motivation of rank-and-file members of terrorist organizations that makes them give up their ambitions within the limits of universally accepted social behavior and seek to give way to their energy in the form of terrorism. Unlike the traditional criminal path which is chosen for lucrative reasons, participation in terrorist activities cannot be explained the same way.
APA, Harvard, Vancouver, ISO, and other styles
5

Kustana, Tatan. "Islamic terrorism in Indonesia: Addressing Government Strategies and Muslim Population." Jurnal Pertahanan 3, no. 2 (December 18, 2017): 77. http://dx.doi.org/10.33172/jp.v3i2.145.

Full text
Abstract:
<p><em>This paper shows how Terrorism has been emerging in the world, the potency to be spread out in the South-East Asian nations, and how Indonesia could face internal challenges to do counter-terrorism of the false Jihad, with multitrack diplomacy, primarily with Police and National Agency for Combating Terrorism counter-terrorism programs. In the perspective of defense strategy, the issue of terrorism brings several implications (Indonesian White Paper 2008, p. 9). The condition of Indonesian community with low educational levels and low economic income becomes target for terrorist actors to expand the network by developing and recruiting new members. The threat of Islamic terrorism is categorized as a national security threat. The Indonesian Government through its security apparatus still have to work hard to hunt down other terrorists, to undertake preventive efforts to prevent Islamic fundamentalist beliefs not to develop and increased education level and the understanding of Islam more comprehensively.</em></p>
APA, Harvard, Vancouver, ISO, and other styles
6

Humaizi, R. Hamdani Harahap, Ridwan Hanafiah, and Rudi Salam Sinaga. "PENDAYAGUNAAN KELOMPOK DISKUSI MAHASISWA DALAM MENANGKAL PAHAM RADIKALISME DAN PAHAM TERORISME DI LINGKUNGAN PERGURUAN TINGGI." ABDIMAS TALENTA: Jurnal Pengabdian Kepada Masyarakat 3, no. 1 (July 9, 2018): 63–67. http://dx.doi.org/10.32734/abdimastalenta.v3i1.2348.

Full text
Abstract:
Terrorism groups have obviously put their attention to recruiting new members of educated people like college-age students, a number of terrorists who have been caught showing their status as students or college students. We consider one of the most important ways to be cultivated in a college environment by conducting radical anti-radical and anti-terrorist campaigns and campaigning the right way to deal with situations that focus on radical thinking and action and terrorism. This study will look at students' perceptions within the Faculty of Social and Political Sciences of the University of North Sumatra against the danger of radical understanding and understanding of terrorism and prevention solutions for the safety of their surrounding environment. The method used in this study is literature study, documentation and focus group discussion (FGD). The results of this study show a strong appreciation of student discussion groups on the intent and purpose of this activity
APA, Harvard, Vancouver, ISO, and other styles
7

Zelenkov, Mikhail Y., Vladimir G. Ponomarev, Valery V. Gusev, Anatoly N. Andreev, and Oleg N. Makarov. "Identification of Advertising Trends in the Mass Media and On the Internet Used by Modern Terrorism." Cuestiones Políticas 37, no. 65 (August 6, 2020): 382–98. http://dx.doi.org/10.46398/cuestpol.3865.26.

Full text
Abstract:
The authors have set themselves the goal of analyzing the mass media and coverage of terrorist attacks on the Internet, to assess their impact on the growing number of terrorists in the world based on this analysis. The methodological basis of this research is represented by the comprehensive approach, which allowed identifying and corroborating the need to restructure the media and the Internet to combat modern terrorism. The epistemological potential of the statistical and sociological methods used within quantitative and qualitative research makes it possible to properly interpret the results of scientific research devoted to the subject of analysis. The results suggest that current activity by the media and Internet users encourages the growth in the number of terrorist acts in the world and improves the efficiency of recruiting newcomers to terrorist organizations. Furthermore, optimal ways of restructuring social media and expanding the scope of control of the operation of the Internet without violating freedom of expression and the right of citizens to free access to information are discussed.
APA, Harvard, Vancouver, ISO, and other styles
8

Kapsokoli, Eleni. "Cyber-jihad in the Western Balkans." National security and the future 22, no. 3 (December 22, 2021): 37–58. http://dx.doi.org/10.37458/nstf.22.3.5.

Full text
Abstract:
During the last two decades, the growing threat of Islamic terrorism has raised numerous security challenges for both states and non-state actors. Cyberspace is weaponized by actors who conduct malicious activities, in order to achieve their goals. Terrorist organizations reflect the darker side of cyberspace. Terrorists use cyberspace to collect data, raise funds, conduct propaganda, spread radical ideologies and hate speech as well as for the purposes of radicalization, recruitment and operational planning. Social media platforms provide a fertile ground to extend the radical ideologies, to spread terror and to connect with people who share the same views. ISIS is considered a pioneer in utilizing the benefits that cyberspace offers. The Western Balkans is a region where ISIS is recruiting foreign fighters and lone-wolves. The European Union is the driving force for the activation of Western Balkans in countering cyberterrorism and developing relevant strategies.
APA, Harvard, Vancouver, ISO, and other styles
9

Choi, Kyung-shick, Claire Seungeun Lee, and Robert Cadigan. "Spreading Propaganda in Cyberspace: Comparing Cyber-Resource Usage of Al Qaeda and ISIS." International Journal of Cybersecurity Intelligence and Cybercrime 1, no. 1 (August 15, 2018): 21–39. http://dx.doi.org/10.52306/01010418zdcd5438.

Full text
Abstract:
Terrorists in cyberspace are increasingly utilizing social media to promote their ideologies, recruit new members, and justify terrorist attacks and actions. This study explores the ways in which types of social media, message contents, and motives for spreading propaganda take shape in cyberspace. In order to empirically test these relations, we created a dataset with annual terrorism reports from 2011 to 2016. In our global cyberterrorism dataset, we used and connected cyber-resources (Facebook, online forum, Twitter mentions, websites, and YouTube videos) and legal documents of individual cases that were mentioned in the reports. The results show that YouTube videos were used primarily for propagating certain ideologies and for recruiting members for Al Qaeda and ISIS. Al Qaeda-affiliated cyberterrorists used YouTube videos as both individual sources and embedded sources for Facebook and Twitter, whereas ISIS-affiliated cyberterrorists predominantly used YouTube videos and Twitter posts.
APA, Harvard, Vancouver, ISO, and other styles
10

Bardhan, Soumia, and Daniel Cutter. "Recruiting Foreign Warriors: Moral and Temporal Tropes in the Islamic State’s Dabiq." Rhetoric and Public Affairs 24, no. 3 (September 1, 2021): 483–520. http://dx.doi.org/10.14321/rhetpublaffa.24.3.0483.

Full text
Abstract:
Abstract To commemorate its declaration of a global khilafah in 2014, the Islamic State (IS) began publishing an online magazine, Dabiq, which became one of its primary recruiting tools during its rise to infamy. By using rhetoric that recalls U.S. presidential war rhetoric, specifically, tropes of “justice” and “time,” the English-language version of Dabiq fulfilled both subversive and hegemonic functions. It disrupted the reductive discourse that equates Islamic terrorists only with barbaric aggression and rendered IS as a rational global actor. Through this subversive move, IS aligned its anti-imperial interests with potential recruits in English-speaking Western countries with similar proclivities. At the same time, through its use of dominant Western war tropes, IS made a hegemonic attempt to facilitate recruits’ cultural identification so they assume a congruence of interests with IS, leading to an alignment of motives. Dabiq thus fulfilled an imperial trajectory through (neo)imperial rhetorics of identification and control. IS’s strategic use of (neo)imperial tropes in English—language of the empire—in Dabiq hence complicates monolithic (and Oriental) perceptions of the relationship between empire, imperialism, and Islamic terrorism in contemporary global political discourse. In addition, the significance of (neo) imperial tropes expands the heuristic scope of the rhetoric of terrorism by highlighting the implications of imperial ambitions and use of (neo)imperial rhetoric for the rise of global Islamic terrorism.
APA, Harvard, Vancouver, ISO, and other styles
11

Hergianasari, Putri. "Konsep Deradikalisasi Pada Pendidikan Berbasis Pembelajaran Terpadu." Scholaria: Jurnal Pendidikan dan Kebudayaan 9, no. 3 (September 26, 2019): 239–44. http://dx.doi.org/10.24246/j.js.2019.v9.i3.p239-244.

Full text
Abstract:
Young people are one of the targets of terrorism groups in recruiting new members. Some terrorists who have been arrested show their status as students or young people. This study discusses the concept of deradicalization in integrated learning-based education, namely on subjects of citizenship, history, religion, also counseling and guidance. In addition, one important way to be developed in the environment of the younger generation is to conduct campaigns against radicalism and peace on a regular basis. This is the right way to improveor recover the situation from radical acts and terrorism. This study uses a literature study method with a qualitative descriptive approach. The unit of analysis of this research is the younger generation who are vulnerable to radicalism. The conclusion is that integrated learning education can strengthen the values ​​of the national character of the younger generation to prevent and fight radicalism.
APA, Harvard, Vancouver, ISO, and other styles
12

Guseynov, Yusup. "Radicalization of Dagestan’s youth in the post-Soviet period." OOO "Zhurnal "Voprosy Istorii" 2020, no. 10-4 (October 1, 2020): 49–52. http://dx.doi.org/10.31166/voprosyistorii202010statyi75.

Full text
Abstract:
The article is based on archival materials, field ethnographic material and examines the problem of youth radicalism in the post-Soviet period. In the XXI century the second regular process of recruiting young people into the ranks of terrorists began. However, thanks to the official clergy (the Muftiate of the Republic of Dagestan), state authorities, public associations of the Republic, the process of radicalization of young people has stopped.
APA, Harvard, Vancouver, ISO, and other styles
13

Zabrocki, Patryk Roger. "Wpływ współczesnych migracji terrorystycznych na bezpieczeństwo." Studia Prawa Publicznego, no. 2(34) (September 15, 2021): 107–23. http://dx.doi.org/10.14746/spp.2021.2.34.4.

Full text
Abstract:
The premise of this text is to analyze by means of selected examples the issues related to the broad definition of security, and modern and developing terrorist migration. Moreover, the aim of this paper is to approach the subject in question from the perspective of the current legal state by means of the formal and dogmatic method, but also by means of the method of criticism and analysis of the literature, which will allow a full understanding of the shape, functioning and causes of errors of modern security bodies. The above will influence the formulation of de lege ferenda postulates in the conclusion. The European Union is based on solid foundations. So how does globalisation, in its broadest sense, affect the world around us and the elementary values of the modern world? Modern terrorism, which strikes at the security of developed countries, is undoubtedly a global phenomenon that also sows fear for normal existence in one’s own country. Unrestricted, cross-border terrorist activity is leading to intra-community division. This is the result of internal conflicts over common values. The surveillance and detection of migrants from outside the European community who are criminals is becoming a more difficult task with time. This is due to the fact that terrorist organisations operate according to a well-defined plan, creating extensive networks and recruiting new members for their groups in many countries simultaneously. The fight against terrorism is being waged on Europe’s streets and in the homes and schools of its citizens. The struggle for security begins at the borders of European countries. What is crucial in this fight is the latest equipment and cooperation between security bodies, including the special services of all the countries of the European Union and NATO. It is essential to introduce appropriate legislation to limit the free movement of people who commit crimes and to develop methods to distinguish terrorists from economic migrants or refugees. The state must guarantee the security of its citizens and combat terrorism effectively.
APA, Harvard, Vancouver, ISO, and other styles
14

Fayed, Abeer Elsayed. "The Role of Electronic Promotion of Terrorism through Social Networks in the spread of terrorists recruiting the youth- Applied to the Kingdom of Saudi Arabia." Global Journal of Economics and Business 5, no. 1 (2018): 109–25. http://dx.doi.org/10.31559/gjeb2018.5.1.7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Rogozhina, N. "ISIS – a Threat to Security of South-East Asia Countries." World Economy and International Relations 60, no. 2 (2016): 5–14. http://dx.doi.org/10.20542/0131-2227-2016-60-2-5-14.

Full text
Abstract:
ISIS poses a real threat to security and stability of South-East Asia countries, inspiring local Islamic extremists to conduct jihad for the purpose of creating a pan-regional caliphate "Daulah Islamiyah Nusantara" comprising the territories of Indonesia, Malaysia, Singapore, Brunei, Southern Philippines and Thailand, where the Muslim population exceeds 250 millions. The author assumes that ISIS has potential for increasing its influence on these countries, taking into consideration 1) the presence of long-standing terrorist organizations, which have established contacts with international terrorists, such as Al Qaeda, and are now ready to swear their allegiance to ISIS; 2) the existence of social base – receptive to the ideology of international jihad – that can increase in number in case of engagement of former ISIS fighters from South-East Asia in the battle for the Islamic State creation in the region. This struggle will lead to terror and violence. And strengthening of the ISIS power in the Middle East gives the militants force and determination in achieving this goal. Now the number of the ISIS fighters from South-East Asia exceeds 800 people, but the flow of new supporters can increase, because there is a well-established basis for their recruiting through: preaching in mosques; indoctrination of students in madrasahs and religious boarding schools, funded by radical Islamic organizations; circulating of religious literature of jihad orientation; local radical groups; social networks. To counter the threat of the Islamic community radicalization, the governments rely on the leading Islam organizations and take actions in different directions. But their outcome will depend on whether the Muslim majority of population preserves the inherent religious tolerance.
APA, Harvard, Vancouver, ISO, and other styles
16

Seib, Philip. "US Public Diplomacy and the Terrorism Challenge." Hague Journal of Diplomacy 14, no. 1-2 (April 22, 2019): 154–68. http://dx.doi.org/10.1163/1871191x-14011012.

Full text
Abstract:
Summary Public diplomacy can be one element of multifaceted counter-terrorism strategy, but to be successful it must be used in timely fashion as a preventive tool. One key to reducing the threat posed by terrorism is to turn off terror groups’ recruiting faucets, and public diplomacy can play an important role in doing this. This article explores the vulnerability of certain populations and how they might be reached and strengthened in ways that undercut terrorist recruitment. This includes recognizing the importance of religion in terrorist recruiting and how it may be addressed constructively. Further, traditional pubic diplomacy programmes such as educational and cultural exchanges have been underestimated as a mean of counteracting the ‘othering’ that increases vulnerable populations’ susceptibility to terrorist recruitment.
APA, Harvard, Vancouver, ISO, and other styles
17

OZERCHUK, I. "Problems of providing protection of cyber space from the activities of terrorist organizations." INFORMATION AND LAW, no. 4(39) (December 9, 2021): 148–54. http://dx.doi.org/10.37750/2616-6798.2021.4(39).248842.

Full text
Abstract:
The problems of ensuring the protection of cyberspace from the activities of terrorist organizations have been studied. The existing definitions of terrorism in cyberspace in the legal literature are considered. There is an analysis of legislative acts in the field of counter-terrorism, among which the Cyber ​​Security Strategy of Ukraine and the Concept of Counter-Terrorism stand out. The article covers main tendencies of development of activity of the international terrorist organizations with use of information technologies, main tasks of which are reduced to: propaganda of terrorism, including with use of the Internet; recruiting and training new members; obtaining information about the objects of possible terrorist attacks; ensuring terrorist activities; distribution of instructional materials for the manufacture of explosive devices. On the basis of the analysis of innovations of the anti-terrorist legislation of the EU countries the ways of improvement of counteraction of activity of the terrorist organizations in cyberspace are offered.
APA, Harvard, Vancouver, ISO, and other styles
18

Balo, Yusuf Solmaz, and Felix Butz. "Terrorist Offenses and Juveniles – a Comparison between Germany and Turkey." European Journal of Comparative Law and Governance 9, no. 1 (December 1, 2021): 7–55. http://dx.doi.org/10.1163/22134514-bja10026.

Full text
Abstract:
Abstract Terrorism criminal law and juvenile criminal law are branches of law that modify default criminal law provisions. In terms of their goals, these approaches mostly oppose each other. While the primary purpose of terrorism law is to meet the security needs of society, juvenile criminal law serves the privileged interests of juveniles and their reintegration to that society. With increasing active recruiting of juveniles by terrorist organizations, the question arises of what legal systems are doing in the face of juvenile terrorist offenses. This paper analyses and compares legal responses to terrorist crimes by juveniles in Germany and Turkey. The authors conclude that in Germany juvenile terrorist offenses are granted the benefits of juvenile criminal law to a higher degree than in Turkey. This has various legal and extra-legal reasons; however, in both legal systems reforms seem necessary to react more adequately to this troubling form of juvenile delinquency.
APA, Harvard, Vancouver, ISO, and other styles
19

Fajar, Mia Dayanti, and Elisabeth Dewi. "‘Bride Terrorist’ in Indonesia: Is She Still Considered as a Peace Agency?" SALASIKA: Indonesian Journal of Gender, Women, Child, and Social Inclusion's Studies 2, no. 2 (July 31, 2019): 1–95. http://dx.doi.org/10.36625/sj.v2i2.37.

Full text
Abstract:
ISIS and Al-Qaeda are now recruiting women to join terrorism groups. These two large terrorist groups even show the real use of women as suicide bombers in terrorist acts. This is certainly controversial since women have a close relationship with peace. It indicates a shift in traditional feminist thinking saying that women are identical with peace. The involvement of women in terrorism can also be traced in Indonesia. In December 2016, Indonesia was shocked by the arrest of a prospective suicide bomber with her husband. The phenomenon occurred along with female Chechen suicide bombers, Black Widows, who blew themselves up to avenge their husbands’ death. This paper aims to explain the involvement of women in the world of terrorism and any reason taken by women to commit suicide bombings. The result of this research revealed that women were involved in terrorism because of patriarchal culture and personal factors that was based on religion by doctrinization in Indonesia.
APA, Harvard, Vancouver, ISO, and other styles
20

West, Lindsay A., Richard V. Martin, Courtney Perkins, Jennifer M. Quatel, and Gavin Macgregor-Skinner. "Opposing Viewpoints on Youth Social Media Banning in the U.S. for the Combatance of Extremist Recruiting." International Journal of Cyber Warfare and Terrorism 6, no. 4 (October 2016): 1–12. http://dx.doi.org/10.4018/ijcwt.2016100101.

Full text
Abstract:
Today, terrorist groups are recruiting, inspiring, and guiding global strategies not just by Internet operations, but through an organized, steady infusion of propaganda videos and call-to-action messages. Most worrisome: increasing evidence that the youth population represents a particularly susceptible cohort, being drawn into the ranks of terrorist organizations operating worldwide. In response, this article will address the pros and cons of social media banning, its effects on constitutional rights, and its effectiveness towards decreasing radicalization and recruitment. The research presented here aims to further the field of Homeland Security and to encourage debates on how to decrease terrorism and youth recruitment and whether banning social media would assist the Department of Homeland Security's mission. In conclusion, this article explores both sides of the spectrum while offering insight for scholars, organizations, and practitioners regarding the attainability of social media banning in the United States.
APA, Harvard, Vancouver, ISO, and other styles
21

Keldasov, Timur Dzhumagulovich. "Recruitment of Russian youth by extremist organizations." Полицейская деятельность, no. 5 (May 2022): 32–39. http://dx.doi.org/10.7256/2454-0692.2022.5.30170.

Full text
Abstract:
The article examines the current problems of recruiting young people to extremist organizations using both religious motivation and social problems of recruitment objects. The article describes the results of a study to identify the motives and reasons for citizens' participation in the activities of terrorist and extremist organizations. The practice of improving the system of measures to counter extremist organizations in recruiting new members is considered. In addition, the subject of the study includes recruiting tools, the structure of the recruitment process, models for attracting new members to terrorist organizations, as well as characteristics of potential recruits. The methodological basis of the research is such general scientific and private scientific methods as analysis, formal-logical and formal-legal. Based on the analysis of current law enforcement practice, modern statistical data and the points of view of other researchers, the reasons that complicate the effect of the norms of Russian legislation on recruiters and the application of preventive measures within the framework of the problem are reflected. The main results of the conducted research allow us to identify significant gaps in the issues of countering terrorism and extremism at the initial stages. The variants of solving the issue by introducing the cult of love for the Motherland into the consciousness of young people, as well as the skills of correct understanding of moral and religious values are proposed.
APA, Harvard, Vancouver, ISO, and other styles
22

Jain, Pooja N., and Archana S. Vaidya. "Analysis of Social Media Based on Terrorism — A Review." Vietnam Journal of Computer Science 08, no. 01 (July 9, 2020): 1–21. http://dx.doi.org/10.1142/s2196888821300015.

Full text
Abstract:
With the ever-growing number of online social media platforms, the world has shrunk even further with regards to communication and knowledge-sharing perspective. However, communication, at times, can be deterrent when misused using such widespread social media tools. The acts of terrorism become seemingly convenient as the barrier of communication is nullified. This propagation of hateful content becomes much more easier and even recruiting anti-socials gets easier. Oddly, these social media platforms are the ones that prove essential during such crisis situations. This paper reviews most of the works reported by various authors in the last 10 years on the use of social media during a time of terrorist attack to addressing how to use social media for public communication with the emergency organization and military or police during terrorist attack, how to perform post-attack social media analytic and how to detect acts of terrorism, unrest, and hatred using social media analytic. With this objective, the authors also hope to inspire other researchers to work in this direction and use this review as a guide for instigating future research to counter-attack terrorism as it is the need of the hour for our country in the wake of recent Uri and Pulwama attack.
APA, Harvard, Vancouver, ISO, and other styles
23

Umam, Shohebul. "THE STRUGGLE OF RELIGIOUS CONSERVATISM AND TERRORISM: CHALLENGES TO INDONESIA'S ISLAMIC MODERATION." JURNAL SETIA PANCASILA 3, no. 1 (September 5, 2022): 22–38. http://dx.doi.org/10.36379/jsp.v3i1.282.

Full text
Abstract:
The multidimensional crisis caused by the Covid-19 pandemic has pushed for the strengthening of Islamic conservatism, which is one way that makes it easier for terrorism to enter and develop in society. In the midst of a conservative society towards religion, terrorist groups circulate the narrative of Covid-19 as an 'end of time' condition that must be faced with militant jihad, and has proven to be effective in the recruitment process, propaganda, to be effective in mobilizing emotions to carry out acts of terror. The method used is qualitative with a literature study approach through collecting data on reports and literature from previous research results, as well as online news. This study has identified that terrorist groups have successfully adapted to the conditions of the Covid-19 pandemic, and made the pandemic a new issue and inspiration in recruiting, propaganda, and terrorizing acts. Therefore, governmentagencies related to terrorism prevention must be able to develop strategies that are adaptive to this new situation, where so far the approach to counter terrorism has so far been ad hoc. Therefore, the deradicalization policy is not only realized in the form of reorientation and resocialization, but is also encouraged to build counter narratives with terrorism groups in implanting radical ideologies, through new steps, collaborating with mainstream mass organizations such as NU and Muhammadiyah in building a narrative of Islamic moderation, both culturally and through new internet channels.
APA, Harvard, Vancouver, ISO, and other styles
24

Merkuryev, Victor, Oksana Khlopkova, and Aleksandr Klementev. "Counteracting the Use of Gamification Technology for Terrorist and Extremist Purposes." Russian Journal of Criminology 14, no. 1 (February 28, 2020): 87–95. http://dx.doi.org/10.17150/2500-4255.2020.14(1).87-95.

Full text
Abstract:
The development of information technologies, changes in the nature of work, transformation of public values lead to a spread of gamification technology and its wide use in the sphere of social management of public and business structures. The authors examine the historical aspect of the development of gamification technology and its practical application in different public sectors. Generalization of the existing data on the essence of gamification made it possible to work out its concept. The authors describe the mechanism of creating a game model and analyze approaches to its design. They are convinced that the advantages of gamification as a social technology are based on specific traits of human psychology and enable its use as a mechanism of covert manipulation. The paper presents examples of using gamification in business, state regulation, management of social processes. The research of the activities of transnational terrorist organizations became a basis for the conclusion that gamification technologies are actively used for terrorist and extremist purposes. The authors also analyze the threats of using gamification in terrorist activities, specifically, for increasing interest in such actions, recruiting new members of terrorist organizations, intensifying the activity of supporters, fundraising and committing terrorist acts. Specific attention is paid to threats of using the gamification technology on the territory of the Russian Federation. The counteraction to the use of gamification technology for terrorist and extremist goals becomes a context for analyzing the normative legal acts of the Russian Federation, including the Complex Plan of Counteracting the Ideology of Terrorism in the Russian Federation in 2019-2023. The authors present a complex of measures aimed at counteracting the use of gamification technology for terrorist and extremist purposes.
APA, Harvard, Vancouver, ISO, and other styles
25

Mohd Arif, Mohd Izzat Amsyar, Nur Hartini Abdul Rahman, and Hisham Hanapi. "Madrasah Education System And Terrorism: Reality And Misconception." International Journal of Educational Best Practices 1, no. 1 (June 12, 2017): 83. http://dx.doi.org/10.31258/ijebp.v1n1.p83-92.

Full text
Abstract:
Since the terrorist attacks on September 11, 2001, the Islamic schools known as madrasah havebeen of increasing interest to analysts and to officials involved in formulating U.S. foreign policytoward the Middle East, Central, and Southeast Asia. Madrasah drew added attention when itbecame known that several Taliban leaders and Al-Qaeda members had developed radicalpolitical views at madrasah in Pakistan, some of which allegedly were built and partially financedthrough Saudi Arabian sources. These revelations have led to accusations that madrasah promoteIslamic extremism and militancy, and are a recruiting ground for terrorism. Others maintain thatmost of these religious schools have been blamed unfairly for fostering anti-U.S. sentiments andargue that madrasah play an important role in countries where millions of Muslims live in povertyand the educational infrastructure is in decay. This paper aims to study a misconception of therole and functions of Islamic traditional religious schools which have been linked with theactivities of terrorism. The study will be specifically focus on practice of the traditional Islamicschool, which is locally called as ‘madrasah system’.
APA, Harvard, Vancouver, ISO, and other styles
26

Tsarenko, Lyudmila Sergeevna, and Olga Sergeevna Peredera. "THE IDEOLOGICAL BASIS OF TERRORIST ORGANIZATIONS, FORMS AND METHODS OF IDEOLOGICAL AND PSYCHOLOGICAL TREATMENT OF MILITANTS AND CIVILIANS (ON THE EXAMPLE OF THE «ISLAMIC STATE» AND «AL-QAEDA») T." Chronos 7, no. 11(73) (December 13, 2022): 59–71. http://dx.doi.org/10.52013/2658-7556-73-11-16.

Full text
Abstract:
This study will examine the ideological foundations, and methods of recruitment, as well as a comparative analysis of two terrorist organizations – Al-Qaeda and the Islamic State. Despite the actual collapse of the first and the significant weakening and decentralization of the second, both organizations are the largest, most powerful and known for their terrorist attacks around the world. Their «success» in committing terrorist attacks was largely due to the methods of recruiting new adherents and loyal supporters into their ranks.
APA, Harvard, Vancouver, ISO, and other styles
27

Radu, Moinescu. "About modern terrorist activities in cyber space." Scientific Bulletin of Naval Academy XIX, no. 1 (July 15, 2018): 90–96. http://dx.doi.org/10.21279/1454-864x-18-i1-013.

Full text
Abstract:
Cyber space has become a vital element for terrorist entities because of the multitude of opportunities that it offers. The article presents an evolution of the use of cyber space for terrorist purposes, from advertising and propaganda platform, to recruiting, influencing or intimidation platform, and even to the development of specialized software for encrypted communications and the possibility in development of cyber threats.
APA, Harvard, Vancouver, ISO, and other styles
28

Suratman, Yosua Praditya. "The Effectiveness of De-Radicalization Program in Southeast Asia: Does It Work? The Case of Indonesia, Malaysia, and Singapore." JAS (Journal of ASEAN Studies) 5, no. 2 (April 28, 2018): 135. http://dx.doi.org/10.21512/jas.v5i2.4302.

Full text
Abstract:
The counterterrorism approach is still harnessed to tackle the spread of radical movement and it is deemed to be a soft strategy for a long term purpose. In the several past years, the government has been conducting de-radicalization program in attempt to bring the terrorist inmates safely to social life after the prison release. This program commonly conducted in the prison while the inmates serving the jail time for terrorism-related offences. Nevertheless, debates rise due to the fail of the program result which prove some recidivists appear to execute another terror attack. An opinion of prison environment which is considered as a potential breeding ground for radicalization aggravates the government effort to reintegrate the prisoners into normal society. This worsened by the activities like recruiting other prisoners and supporting extremist groups from prison which still often occur in Indonesia. Taking two examples from international scope, France has announced to close its de-radicalization program, meanwhile United States under Trump’s leadership prefer to heightened the sentences related to terrorism and to ban Muslim migrants excessively. Meanwhile, Indonesia still convinces that de-radicalization program is one of the most strategic approaches in fighting terrorism, and it is deemed as a soft power with a long term oriented. Therefore, this paper will analyze the effectiveness of the program through theories, facts, and phenomenon. Thus it will yield some recommendations for Indonesian government in strengthening and reshaping its policies.
APA, Harvard, Vancouver, ISO, and other styles
29

Romanovsky, Vladislav, and Rifat Kildeev. "Legal Framework for Counter-Terrorism in Social Networks in Russia and Abroad." SHS Web of Conferences 134 (2022): 00031. http://dx.doi.org/10.1051/shsconf/202213400031.

Full text
Abstract:
The article discusses measures to counter terrorist threats in social networks and instant messengers. It is emphasized that the modern form of communication using digital technologies has started to be actively used by terrorist organizations for recruiting supporters, raising funds, and preparing terrorist attacks. The article analyzes the German (Act on Improving Law Enforcement in Social Networks) and Chinese (Chinese Great Firewall) experience of introducing restrictions and prohibitions in the framework of regulating the activities of companies moderating information through applications and social networks. It is shown that implementing the requirements of the legal regime has not only a legal, but also technological aspect. The peculiarities of the Internet functioning contribute to free implementation of information, including illegal information. This circumstance significantly complicates the tasks of law enforcement agencies in countering terrorist threats.
APA, Harvard, Vancouver, ISO, and other styles
30

Byman, Daniel. "Understanding the Islamic State—A Review Essay." International Security 40, no. 4 (April 2016): 127–65. http://dx.doi.org/10.1162/isec_r_00235.

Full text
Abstract:
This article reviews several recent books on the Islamic State in order to understand its goals, motivations, strategy, and vulnerabilities. It argues that the Islamic State's ideology is powerful but also highly instrumental, offering the group legitimacy and recruiting appeal. Raison d'etat often dominates its decisionmaking. The Islamic State's strength is largely a consequence of the policies and weaknesses of its state adversaries. In addition, the group has many weaknesses of its own, notably its brutality, reliance on foreign fighters, and investment in a state as well as its tendency to seek out new enemies. The threat the Islamic State poses is most severe at the local and regional levels. The danger of terrorism to the West is real but mitigated by the Islamic State's continued prioritization of the Muslim world and the heightened focus of Western security forces on the terrorist threat. A high-quality military force could easily defeat Islamic State fighters, but there is no desire to deploy large numbers of Western ground troops, and local forces have repeatedly shown many weaknesses. In the end, containing the Islamic State and making modest rollback efforts may be the best local outcomes.
APA, Harvard, Vancouver, ISO, and other styles
31

Laura, Simona, Vincenzo Mastronardi, and Monica Calderaro. "Against terrorism. Knowledge is power. The contribution of criminology." Rivista di Psicopatologia Forense, Medicina Legale, Criminologia 23, no. 1 (June 6, 2018): 43–60. http://dx.doi.org/10.4081/psyco.2018.21.

Full text
Abstract:
Terrorism is defined as the series of actions carried out in the context of armed struggles intended not only to attack the opposing armed forces, but to spread fear, distress and insecurity among the civilian populations. Terrorism has always been used to weaken the will resistances of its enemies". Islamic terrorism has a recent origin. We must start by saying that the use of word Islamic is commonly used, but the correct terminology would be Islamist terrorism. It arises from an ideology, in its most extreme meaning, and in this ideology finds the greatest justification for carrying out terrorist acts. The core, therefore, is the Islamic fundamentalist religion that justifies, encourages and supports the Jihad. What does it mean Jihad? Effort straining towards a purpose. The Quran indicates four ways to lead to Jihad: - Fight with the heart preceded by a self-purification against sin - Fight with the tongue to preach justice - Fight with the hand in the punishment of sin - Fight with the sword to teach the infidel What does Sharia (the way) and Khalifa (Caliph) and Shi'a (party) mean? How is tradition, that is the Sunnah, interpreted by the Ulama (wise)? How is the advent of the Mahadi (the Guided) described by the Imams (Imam means the one who precedes)? How can Criminology support? Meanwhile, analyzing the operational mode, then studying the propaganda (central passage of the jihadist phenomenon) to possibly give a hint of what might be the counter-propaganda of the strategies. Propaganda, fundamental issue of cyberwar made by Islamist terrorism, must be studied as propaganda to the masses (through web and production companies), to small groups (in mosques during their sermons and in schools with educational programs reworked and unstructured) and face to face in the process of recruitment and radicalization. It is interesting to look at the training and brain washing processes that are used on the subject, radicalizing to complete the radicalization work. And interesting can be analyzed the arsenal of Isis, the origin of it and the origin of the weapons. If the analysis of economic flows can lead to the identification of illicit, can the analysis of mental flows lead to the identification, in this case, of the potential jihadist, of the recruiting or of the radicalized? Who can be and where could the recruiters be? Are people dedicated to recruitment and radicalization with specific knowledge or are they impromptu people? From what can find the response and for what reason? And who are the people at risk of radicalization? Who could be people already introduced? And the people already introduced what behavior do they have? And where are they located or where could they be found or where do they think they can meet? And how do they aggregate? And according to their ideology, how could they organize themselves and what could they do? And how could they do it? In this delicate task it will be essential to analyze the profiling of the terrorist, to trace the places with geographical profiling, to have all kinds of information with sociological and cultural profiling, to understand the language, to enter as much as possible in the jihadist culture, to evaluate the type of subject that can be radicalized, to have any kind of information about the radicalized subject, to consider the role of women and the motivation for their involvement, to evaluate enslavement and brainwashing on children and adults. The purpose of this work is to try to enter the mind of the Islamic terrorist or of the potential terrorist in order to bring a contribution, as criminologists, in the mechanism of counternarrative at various levels, to reach a possible help in the mechanism of deradicalization both as intervention of primary prevention (namely, before the process of radicalization begins), secondary (after a process of radicalization has already begun), or tertiary (addressed to subjects towards whom only the abandonment of violent ideology or, at least, the disengagement can be proceeded). Discussion. The multidisciplinary approach could be the solution to finding a way for understanding and coexistence of various cultures. Islamic culture is a culture far from the Occidental one and requires in-depth studies to understand it and to ensure that its most extreme meaning does not damage the fundamental human rights. The criminology, as a subject of investigation of the mind, can be a key approach of prevention or deradicalization of Islamist terrorism. To penetrate such an intricate and delicate problem, every kind of strength and knowledge is important and fundamental to restoring balance, peace and serenity in the world.
APA, Harvard, Vancouver, ISO, and other styles
32

Nihayaty, Arini Indah, and Atikah Mardhiya Rohmy. "Pemanfaatan Media Sosial Komunitas Untuk Menghadapi Konten Islam Ekstrim Di Internet." Dakwatuna: Jurnal Dakwah dan Komunikasi Islam 6, no. 2 (August 25, 2020): 213. http://dx.doi.org/10.36835/dakwatuna.v6i2.632.

Full text
Abstract:
Terrorism and radicalism, in the name of religion, which in nature deconstruct the development of the existing state, must be completely eliminated. Moreover, if terrorism and radicalism, by making social media a means of recruiting members. If so, the policy makers must intervene and make a stronghold in the digital space. In addition, there must be a step from the community exponents to participate in combating terrorism and radicalism. For example, from Islamic boarding schools and Islamic community organizations, such as Nahdlatul Ulama or NU and Muhammadiyah, in Indonesia. The existence of NU and Muhammadiyah is central because so far, they have played a role in advancing the nation from all fronts. The activeness of these two community organizations in counter movement, dealing with terrorism and radicalism is a must. Ways that can be taken include da’wah or the spread of positive messages through social media. What is aggressively done through time and space. Keywords: Da'wah, Social Media, Terrorism, Radicalism
APA, Harvard, Vancouver, ISO, and other styles
33

Tosini, Domenico. "Calculated, Passionate, Pious Extremism:Beyond a Rational Choice Theory of Suicide Terrorism." Asian Journal of Social Science 38, no. 3 (2010): 394–415. http://dx.doi.org/10.1163/156853110x499945.

Full text
Abstract:
AbstractThis article proposes a theoretical framework to identify the main ideal types of motivations underlying voluntary suicide missions in terrorist campaigns, with special reference to Sunni extremists, such as Al-Qaeda and its allies. Based on empirical evidence from several suicide missions, the paper argues for conceptualising a specific kind of rationality qualitatively different from a calculation of costs and benefits and in addition to the complex constellation of affectual orientations driving militants. On one hand, martyrdom videos and biographical information on suicide attackers, as well as interviews with would-be suicide bombers, make it plausible to hypothesise not only a type of instrumental rationality in which suicide missions are viewed as adequate means for both egoistic and altruistic goals, but also affects and feeling states, such as outrage and humiliation, that create a desire for revenge. On the other hand, militants’ frequent references to a series of absolute values support the theory of an axiological rationality of suicide terrorism, meant as a disposition to conform unconditionally one’s action to certain moral duties and normative expectations regardless of their consequences. From this perspective, success in recruiting and inspiring suicide bombers, demonstrated by Al-Qaeda’s propagandistic call for jihad and martyrdom in defence of Islam and oppressed Muslim countries, cannot be explained only by militants’ search for social consideration or by their cognitive view of a strategic use of suicide bombings. Such responsive participation in suicide missions is also based on a wide set of emotions and militants’ adhesion to superior principles requiring ultimate sacrifice and indifference to other costs.
APA, Harvard, Vancouver, ISO, and other styles
34

Jafar, Tiara Firdaus, Arfin Sudirman, and Affabile Rifawan. "Ketahanan Nasional Menghadapi Ancaman Lone Wolf Terrorism Di Jawa Barat." Jurnal Ketahanan Nasional 25, no. 1 (April 9, 2019): 73. http://dx.doi.org/10.22146/jkn.41244.

Full text
Abstract:
ABSTRACTWest Java had been considered as the most vulnerable area for the spread of radicalism in Indonesia, its presence brought new threats which were considered more difficult to detected than a network of structured terrorism organizations. This article emphasized the issue of lone wolf terrorism and the history of its development from structured terrorism organizations in West Java.By using 4 typologies proposed by Raffaello Pantucci namely loner, lone wolf, lone wolf pack and lone attacker this article concluded that the occurrence of a network-based terrorism movement or Transnational Organized Crime to Lone Wolf Terrorism in West Java was the same pattern carried out in conflict areas in Iraq and Syria. This was caused by the disconnection of structural-organizational communication between its members and recruiting process was conducted randomly.ABSTRAK Jawa Barat telah dianggap sebagai daerah paling rawan penyebaran paham radikalisme di Indonesia, kehadirannya membawa ancaman baru yang dinilai lebih sulit untuk dideteksi daripada jaringan organisasi terorisme terstruktur. Artikel ini menekankan pada isu lone wolf terrorism dan sejarah perkembangannya dari organisasi terorisme terstruktur di Jawa Barat.Dengan menggunakan 4 tipologi yang dikemukakan oleh Raffaello Pantucci yakni loner, lone wolf, lone wolf pack dan lone attacker artikel ini menyimpulkan bahwasanya terjadinya pergeseran gerakan terorisme berbasis jaringan atau Transnational Organized Crime ke Lone Wolf Terrorism di Jawa Barat merupakan pola yang sama dilakukan di daerah konflik di Irak dan Suriah. Hal tersebut disebabkan oleh diputuskannya komunikasi struktural-organisasional antar anggotanya serta perekrutan dilakukan secara acak.
APA, Harvard, Vancouver, ISO, and other styles
35

Jwaifell, Mustafa, Sami F. Aljazi, and Al-Mothana Gasaymeh. "The Digital Citizenship and Its Role in Facing Electronic Terrorism among Secondary School Students in Middle East: Jordan as an Example." International Journal of Learning and Development 9, no. 1 (February 19, 2019): 73. http://dx.doi.org/10.5296/ijld.v9i1.13855.

Full text
Abstract:
The aim of the study was to determine the level of digital citizenship among secondary school students in Middle East through recruiting students from Southern of Jordan, particularly from Ma'an Directorate to participate in the study, In addition, the study aimed to examine the relationship between students’ level of digital citizenship and their attitudes toward different forms of electronic terrorism. The study sample consisted of 186 school students. The data collection tool was a questionnaire instrument. The results showed that the students had a high level of digital citizenship and their level of digital citizenship was not affected by their gender or their type of the study. In addition, the results showed that the students expressed very unfavorable attitudes toward electronic terrorism. Furthermore, the results showed that there was significant relation between students’ level of digital citizenship and their attitude toward electronic terrorism. Based on the results, the study suggested that to face electronic terrorism among school students, there is need to enhance their level of digital citizenship through providing continues training and meetings that aim to make school students aware of the requirements of digital citizenship.
APA, Harvard, Vancouver, ISO, and other styles
36

Sánchez-Rebollo, Cristina, Cristina Puente, Rafael Palacios, Claudia Piriz, Juan P. Fuentes, and Javier Jarauta. "Detection of Jihadism in Social Networks Using Big Data Techniques Supported by Graphs and Fuzzy Clustering." Complexity 2019 (March 10, 2019): 1–13. http://dx.doi.org/10.1155/2019/1238780.

Full text
Abstract:
Social networks are being used by terrorist organizations to distribute messages with the intention of influencing people and recruiting new members. The research presented in this paper focuses on the analysis of Twitter messages to detect the leaders orchestrating terrorist networks and their followers. A big data architecture is proposed to analyze messages in real time in order to classify users according to different parameters like level of activity, the ability to influence other users, and the contents of their messages. Graphs have been used to analyze how the messages propagate through the network, and this involves a study of the followers based on retweets and general impact on other users. Then, fuzzy clustering techniques were used to classify users in profiles, with the advantage over other classifications techniques of providing a probability for each profile instead of a binary categorization. Algorithms were tested using public database from Kaggle and other Twitter extraction techniques. The resulting profiles detected automatically by the system were manually analyzed, and the parameters that describe each profile correspond to the type of information that any expert may expect. Future applications are not limited to detecting terrorist activism. Human resources departments can apply the power of profile identification to automatically classify candidates, security teams can detect undesirable clients in the financial or insurance sectors, and immigration officers can extract additional insights with these techniques.
APA, Harvard, Vancouver, ISO, and other styles
37

Kurshev, Albert Khasanovich. "FORMATION OF RESILIENCE AMONG EMPLOYEES OF INTERNAL AFFAIRS BODIES TO RECRUITING ACTIVITIES OF EXTREMIST AND TERRORIST ORGANIZATIONS." Journal of Applied Research 2, no. 3 (2021): 69–73. http://dx.doi.org/10.47576/2712-7516_2021_3_2_69.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Rubiyanto, Eko, and Munsharif Abdul Chalim. "Counter Terrorism : Case Study On The Radicals Religious Group." Jurnal Daulat Hukum 1, no. 4 (December 10, 2018): 869. http://dx.doi.org/10.30659/jdh.v1i4.3928.

Full text
Abstract:
This research aims to explore counter terrorism: a case study of radical religious group. This research used the normative juridical approach. Data collection techniques using data reduction, data presentation, triangulation and conclusion. The results showed that the group of religious radicalism in the jurisdiction of Bekasi police pioneered by asatidz or Imam FPI called for promotion of hatred toward religious groups. The media used in the spread of religious radicals in Bekasi Police Jurisdiction is through social media with the modus operandi of instilling the idea that Islamic law is the most correct. In recruiting, there are several methods used, including the cadre, mentoring, and mastery of places of worship with the main target is the younger age groups. Flourishing of religious radicalism caused by several factors, among others. Bekasi location of the region as a buffer capital city of Jakarta, the lack of supervision of the police, the involvement of religious leaders, the low education level of the community, as well as the economic conditions of the needy. Policing is done by Bekasi policecurrently done with prevention efforts, either through counseling activities, socialization, door to door system, coordination with Tomas, Toda, or Toga, as well as joint meetings FKUB about the dangers of radicalism and terrorism. The effort is still deemed less effective, so the Bekasi police in the future in the fight against terrorism must be put forward Counter Radicalization and Deradicalisation to strengthen four pillars of nationhood.Keywords: Radicalism; Terrorism; Religion.
APA, Harvard, Vancouver, ISO, and other styles
39

Zakiyah, Zakiyah. "THE CHRONICLE OF TERRORISM AND ISLAMIC MILITANCY IN INDONESIA." Analisa 1, no. 1 (May 19, 2016): 19. http://dx.doi.org/10.18784/analisa.v1i1.276.

Full text
Abstract:
<p>This paper examines the chronicle of terrorism in Indonesia and the relationship between terrorism and Islamic militancy in this nation. This research focused on bombing cases from 2001 to 2012 Data was gathered through documentary research including primary and secondary resources. This research shows that after the fall of the Suharto regime in 1998, there were bomb attacks on various targets and militant extremists were able to return to Indonesia after long period of exile abroad. They started again their activities including disseminating their radical ideology, building networks and recruiting new members in Indonesia, as well as preparing for militant actions. The perpetrators of these terror attacks were mostly associated with the Islamic radical groups like <em>Jemaah Islamiah</em> and <em>Majlis Mujahidin Indonesia</em>. These two militant groups had a close relationship with <em>Darul Islam</em>, an organization founded during the colonial era that aimed to establish an Islamic state and to apply <em>Syariah</em> as a state law. In addition, both groups became a political window for al-Qaeda in Indonesia. </p>
APA, Harvard, Vancouver, ISO, and other styles
40

Shorer, Marina. "Mobilization of Women to Terrorism: Tools and Methods of ISIS." International Annals of Criminology 56, no. 1-2 (September 4, 2018): 93–104. http://dx.doi.org/10.1017/cri.2018.16.

Full text
Abstract:
AbstractAs of the beginning of 2016, out of 100,000 “Islamic State in Iraq and Syria” (ISIS) fighters in Iraq, Syria, Sinai and North African Countries, one-third were foreign-born fighters from European and Asian countries (AFP Tunis 2013). Although most of the men came alone, seduced by advertised sexual adventures, the official guiding rule by the ISIS Caliphate was to establish true marriage with real Muslim brides (Milton and Dodwell 2018). The Western women were then addressed to come and help in administrative, teaching and nursing tasks while also instituting families with jihadi fighters. Estimations are that at least 450–500 Western women of different ages left their countries to join ISIS mujahedin. For these mobilization efforts, social networks were utilized to serve as means of communication, coordination and conversion of women’s minds. The skilled usage of different levels of social networking tools, combined with precise audience targeting, turned the efforts into powerful recruiting instruments for mobilization of women into terrorist activities. The ISIS strategy included careful selection of different scenarios and storyboards for different target audiences, thus maximizing the impact of the exposure to the message and mobilization.
APA, Harvard, Vancouver, ISO, and other styles
41

Jassim, Firas Naeem. "Legal Protection of Children from Recruitment and Participation in Hostilities in the Light of the Provisions of the International Law and Iraqi National Legislations." Al-Adab Journal 1, no. 126 (September 15, 2018): 474–503. http://dx.doi.org/10.31973/aj.v1i126.73.

Full text
Abstract:
Children are the most community members who are at risk of getting harm and be in danger at the time of armed conflicts, and often the parties of the conflicts exploit children by recruiting them and engaging them in hostilities. This phenomenon is one of the serious violations done by terrorist groups that emerged after 2003 and suffered by Iraqi children. This research falls into three parts. The first part deals with the recruitment and involvement of children in hostilities and the resulted consequences. The second part sheds light on the international guarantees for the protection of children from recruitment and participation in hostilities. The third part describes the legal protection of children from recruitment and participation in hostilities in the light of Iraqi legislations. The research ends up with the conclusions as well as recommendations that may contribute to enhancing the protection of children involved in armed conflicts.
APA, Harvard, Vancouver, ISO, and other styles
42

Rawat, Romil, Sonali Gupta, S. Sivaranjani, Om Kumar C.U., Megha Kuliha, and K. Sakthidasan Sankaran. "Malevolent Information Crawling Mechanism for Forming Structured Illegal Organisations in Hidden Networks." International Journal of Cyber Warfare and Terrorism 12, no. 1 (January 1, 2022): 1–14. http://dx.doi.org/10.4018/ijcwt.311422.

Full text
Abstract:
Terrorist groups like ISIS have made considerable use of the dark web (DW) to carry out their malicious objectives such as spreading propaganda, recruiting and radicalizing new recruits, and secretly raising finances. Al-Hayat Media Center, an ISIS media agency, released a link on their forum describing how to access their DW website. It also sent out the identical message over Telegram, which included links to a Tor service with a “.onion” address. This study develops an analytical framework for scraping and analyzing the DW on the internet. The authors successfully tested a web crawler to collect account information for thousands of merchants and their related marketplace listings using a case study marketplace. The paper explains how to scrape DW marketplaces in the most viable and effective way possible. The findings of the case study support the validity of the proposed analytical framework, which is useful for academics researching this emerging phenomena as well as investigators looking into illegal behavior on the DW.
APA, Harvard, Vancouver, ISO, and other styles
43

Ridlwan, Mujib. "Dialektika Pesantren Dan Radikalisme Di Pesisir Utara Lamongan." Jurnal Darussalam: Jurnal Pendidikan, Komunikasi dan Pemikiran Hukum Islam 11, no. 1 (September 20, 2019): 36. http://dx.doi.org/10.30739/darussalam.v11i1.448.

Full text
Abstract:
This article wants to explain about the dialectics of pesantren and radicalism by taking place in the region of Lamongan Regency. The National Counter-Terrorism Agency (BNPT) had announced that there were dozens of pesantren from thousands of pesantren in Indonesia indicated to be involved in recruiting radical santri, including one in Lamongan. But the announcement of the BNPT caused an assessment to be generalized towards all pesantren in Indonesia by foreign observers, that all (not some) pesantren in Indonesia teach radicalism. Evil acts committed by a handful of people cause many other people to be affected. In fact, pesantren which are accused of being indicated to teach radicals also deny that they teach radicals. What exactly is the pesantren dialectic and radicalism and what kind of pesantren teach radicalism? The results of interviews and field findings can prove whether there really is pesantren dialectic and radicalism.
APA, Harvard, Vancouver, ISO, and other styles
44

du Preez, Madely. "Hypermedia Seduction for Terrorist Recruiting20093Edited by Boaz Ganor, Kathrina von Knop and Carlos Duarte. Hypermedia Seduction for Terrorist Recruiting. Amsterdam: IOS Press 2007. 289 pp. Price not reported (hard cover), ISBN: 9781586037611." Online Information Review 33, no. 1 (February 20, 2009): 210–11. http://dx.doi.org/10.1108/14684520910944490.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Libor, Frank. "Security, Defence and Armed Forces - Public View." International conference KNOWLEDGE-BASED ORGANIZATION 23, no. 1 (June 20, 2017): 184–88. http://dx.doi.org/10.1515/kbo-2017-0029.

Full text
Abstract:
Abstract The paper deals with the interpretation of public opinion polls in the Czech Republic related to security, defence and armed forces. In recent years, we can observe concern about the security situation development in the relatively close vicinity of the Czech Republic. In particular, information regarding the activities of the so-called Islamic State, the conflict in Ukraine and media presentation of recent terrorist attacks, as well as the dominant securitization of migration, have a major impact on the public opinion and the level of support for specific steps of the government in the field of security and defence policy. In the surveys, we can trace not only the growing public concern, but also the increasing support for higher defence spending and possible reintroduction of some form of compulsory military service. Special attention is paid to the public perception of the armed forces and the interpretation of the latest public opinion polls at the turn of 2016/2017. The growing support for the military and the increasing willingness of the public to engage in the Active Reserve System are positive factors that can be used to meet the recruiting goals of the Czech Armed Forces.
APA, Harvard, Vancouver, ISO, and other styles
46

Kouba, Tomáš. "ONLINE RADICALIZATION: TWITTER PRIVATIZATION AS A THREAT TO THE MODERN SOCIETY." Politika nacionalne bezbednosti, Special issue 2022 (November 25, 2022): 101–10. http://dx.doi.org/10.22182/pnb.specijal2022.9.

Full text
Abstract:
Social media plays a key role in the contemporary world, having indefinite power to influence people by just a single post and click of a button, reaching millions of people in a few seconds. In April 2022, Elon Musk announced his step into the world-famous‘wall of opinions’ – Twitter– with words of creating a better, free-speech-based platform with no limitations. Since online radicalization became the easiest and most powerful recruiting tool for terrorist and extremist organizations, this raised concerns about whether this action is beneficial or not. The aim of the paper was to describe the principle of online radicalization and present it via evidence-based examples, as well as transpose the known aspects of Elon Musk’s purchase of Twitter. A comparison study was made between these known examples of radicalization on the Internet, currently used preventive policy principles and possible future steps based on the announcements of Elon Musk himself. Results confirmed that online radicalization is the most effective method for extremists, and that the society and authorities should keep an eye on the development of the platform regarding the real threat of losing control over the content that can be harmful to Twitter users. Free speech is a strong argument for freeing the rules of sharing content, but the ‘dark side’ of this move has to be considered as well.
APA, Harvard, Vancouver, ISO, and other styles
47

Sanjeev Kumar H.M. "ISIS and the Sectarian Political Ontology: Radical Islam, Violent Jihadism and the Claims for Revival of the Caliphate." India Quarterly: A Journal of International Affairs 74, no. 2 (April 11, 2018): 119–37. http://dx.doi.org/10.1177/0974928418766683.

Full text
Abstract:
Islamic State of Iraq and Syria (ISIS) as a radical organisation acquired a massive global appeal by virtue of stretching its ideological influence beyond Arab-centric focus and recruiting followers from across the world. Central to such widespread popularity was the conception of a unified Islamic Ummah which is located in a transnational Islamic State (IS) (Caliphate) that is governed in accordance to the tenets of Islamic law (shari’a). However, at the heart of this idea was a militant sectarian political ontology that distorted the notion of a unified Islamic Ummah. Articulated as a global grand strategy, the cosmopolitan Islamic imagination of the ISIS has been nothing more than a myopic assertion of a fanatic ideology of violence and terrorism. By sustaining such a notion through a forceful imposition of a Kharijite brand of extremism and sectarianism, the ISIS sought to contort the tolerant multifaceted and multilayered fabric of Islam that tends to accommodate diverse ethno-nationalistic, linguistic and racial pluralities and believes in the metaphysical communion of multiple faiths. The aim behind such an endeavour was the elimination of all those whom the ISIS considers as opposed to its ideology which is embedded in a narrow sectarian interpretation of what it designates as pure Islam. The genealogical impulse that lies at the bottom of such an ideology was its grand vision to assume a hegemonic position in the sphere of global jihadi movements.
APA, Harvard, Vancouver, ISO, and other styles
48

Coleman, C. N., M. K. Dosanjh, J. Buchsbaum, S. Formenti, and D. A. Pistenmaa. "The Future of Global Radiation Oncology As Part of Accurate, Precision Cancer Medicine." Journal of Global Oncology 4, Supplement 2 (October 1, 2018): 91s. http://dx.doi.org/10.1200/jgo.18.77400.

Full text
Abstract:
Background: When global health and cancer care are discussed, it is usually in the context of underserved communities, inadequate resources, standards of care below that in the developed world, loss of talented individuals to upper-income countries and the inability to recruit and retain a robust regional workforce. While such conditions may now exist, they are by no means “guaranteed” to be so in the future. Aim: To consider a visionary future for the radiation sciences to encourage investment by individuals in their careers and countries in their cancer care resources such that the current resource-limited facilities will be on the leading edge of accurate, precision radiation medicine. Such a change in perspective can greatly impact recruiting and retaining expertise. Methods: As part of building a visionary strategic plan for radiation oncology and the radiation sciences for the next few decades, a personal opinion paper was prepared by authors from the US National Cancer Institute, Conseil Européen pour la Recherche Nucléaire (CERN)/European Organization for Nuclear Research and the International Conference on Translational Research in Radio-Oncology/Physics for Health in Europe. Considering the critical role for global involvement in the future of radiation sciences, the paper provides a path forward via “win-win” sustainable partnerships formed by current resource-limited and resource-rich countries, as envisioned by the International Cancer Expert Corps ( www.iceccancer.org ). Results: The manuscript “ Accurate, precision radiation medicine: a meta-strategy for impacting cancer care, global health, nuclear policy, and mitigating radiation injury from necessary medical use, space exploration and potential terrorism” is in press. A figure (the Radiation Rotary) illustrates that there are a number of crossroads facing the radiation sciences best addressed as part of a rotary. Four sets of issues are illustrated: 1) cancer care with radiation therapy as both technology and biology, 2) global collaboration in technology development ranging from improved linear accelerators for resource-challenged environments to particle therapy for highly specialized uses, 3) nuclear policy, from energy to the potential for nuclear terrorism and conflagration, and 4) mitigating radiation injury including enabling long-term space exploration, helping reduce the fear of radiation and producing drugs to mitigate radiation injury. Conclusion: Many of these technology, research and development issues must involve LMICs. This is in addition to understanding the differences between upper- and lower-income regions in cancer biology and the environment, including infectious etiologies, diet and the microbiome. The talent and capability of radiation oncologists and related professionals within LMICs are essential to global health and economic development and provide incentives and unique opportunities for world-leading careers and contributions. Disclaimer: The content is the personal opinion of the authors and not their organizations
APA, Harvard, Vancouver, ISO, and other styles
49

"SOCIO-POLITICAL FACTORS OF TERRORIST GROUPS EXISTENCE IN ISLAMIC STATES." Journal of V. N. Karazin Kharkov National University. Issues of Political Science, no. 38 (2020). http://dx.doi.org/10.26565/2220-8089-2020-38-11.

Full text
Abstract:
The question about socio-political conditions in Islamic states, which may affect the activities of terrorist organizations is considered. The countries of the Middle East are most often faced with terrorist activity. The population of these countries may be ethnically diverse or homogeneous, but the overwhelming majority professes Islam - a religion that has spiritual, legal and socio-political principles, offers an alternative approach to the foundations of the state system and the principles of its functioning. Islamism as a political trend has its supporters among both moderate and radical social groups in these countries. The ruling elites of some countries proclaims Islam the state religion with the appropriate preferences for it. However, Islamic states no less, and sometimes more than other countries in these regions, suffer from the activities of terrorist groups. A number of socio-political characteristics that take place in Islamic states is highlighted, and their possible connection with the emergence and further activities of terrorist groups in any direction (from collecting information and recruiting local people to preparing and conducting a terrorist attack) is considered. Attention is paid to the relationship between the stability of the political system in Islamic states and their controllability of the territory within their own borders with the presence and type of the activities of terrorist organizations. The mutual importance of the problems of security, education, living conditions and features of the political regime in the issue of the risk of the emergence and further existence of terrorist groups in the Islamic state is accented. The necessity of a complex of factors for the existence of a terrorist group is emphasized. It is noted that this complex is different for the constant or short-term activities of terrorists. The deterioration of the situation regarding the existence and activities of terrorists in the country is the greater, the more threatening factors appear, the less important will be the features of the political regime. The priority of individual factors in the presence of various situations is established type.
APA, Harvard, Vancouver, ISO, and other styles
50

Sunde, Hans Myhre, Jonathan Ilan, and Sveinung Sandberg. "A cultural criminology of “new” jihad: Insights from propaganda magazines." Crime, Media, Culture: An International Journal, April 27, 2020, 174165902091550. http://dx.doi.org/10.1177/1741659020915509.

Full text
Abstract:
The backgrounds and modus operandi of more recent jihadi terrorists tend to share factors and characteristics more typically associated with non-political violence such as mass-killings and gang violence. Their attacks, moreover, seem to have been precipitated not by the direct instructions of a formal hierarchy but by the encouragement of propaganda produced and disseminated by networked, media-savvy terrorist groups. It is necessary to explain how these “recruitment” efforts work. Cultural criminology, with its understanding of the relationship between mediated meaning and individual experience, can provide such an analysis. The article presents a qualitative document analysis of 32 propaganda magazines produced by the Islamic State and Al-Qaeda. It demonstrates that they contain significantly more than religious rhetoric and military strategy. Rather, they are part of a process that crystalizes a jihadi subculture that appeals to disaffected and/or marginalized, excitement-seeking youths. The magazines cultivate violence by constructing a militarized style that celebrates outlaw status, where violence is eroticized and aestheticized. They idealize the notion of a jihadi terrorist that is tough and willing to commit brutal violence. The lifestyle portrayed offers the possibility of heroism, excitement, belonging and imminent fame, themes often espoused by conventional, Western consumer culture. The magazines occasionally draw on street jargon, urban music, fashion, films, and video games. The subcultural model of jihadi propaganda we explicate provides a novel way of understanding terrorist recruiting tactics and motivations that are not necessarily in opposition to contemporary conventional criminal and “mainstream” cultures, but in resonance with them.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography