Search results
1 – 10 of 168Patrick J. O’Halloran, Christian Leuprecht, Ali Ghanbar Pour Dizboni, Alexandra Green and David Adelstein
This paper aims to examine whether the money laundering/terrorist financing (ML/TF) model excludes important aspects of terrorist resourcing and whether the terrorist resourcing…
Abstract
Purpose
This paper aims to examine whether the money laundering/terrorist financing (ML/TF) model excludes important aspects of terrorist resourcing and whether the terrorist resourcing model (TRM) provides a more comprehensive framework for analysis.
Design/methodology/approach
Research consisted of case studies of resourcing activities of four listed terrorist organizations between 2001 and 2015: the Liberation Tigers of Tamil Eelam (LTTE), Hamas, a grouping of Al Qaeda-inspired individuals and entities under the heading “Al Qaeda inspired” and Hezbollah.
Findings
The most prevalent resourcing actors observed were non-profit organizations/associations, and the most prevalent form of resourcing was fundraising that targeted individual cash donations of small amounts. Funds were pooled, often passed through layers of charitable organizations and transmitted through chartered banks. The TRM is indeed found to provide a more comprehensive framework for identifying sources of resourcing and points of intervention. However, it does not in itself recommend effective means of response but it has implications for counter-resourcing strategies because it identifies resourcing actors and nodes where counter-resourcing could occur.
Originality/value
This paper advances the state of knowledge of terrorist resourcing activities in Canada and about the value of doing so through the analytical lens of the TRM as opposed to the predominant ML/TF model.
Details
Keywords
I discuss the case of Hassan Almrei, one of the five Arab men detained as suspects who have the potential to engage in terrorism. Hassan Almrei's detention arises out of a section…
Abstract
I discuss the case of Hassan Almrei, one of the five Arab men detained as suspects who have the potential to engage in terrorism. Hassan Almrei's detention arises out of a section of the Immigration and Refugee Protection Act of Canada that authorizes security certificates. A security certificate permits the detention and expulsion of non-citizens who are considered to be a threat to national security. Detainees have no opportunity to be heard before a certificate is issued and a designated judge of the Federal Court reviews most of the government's case against the detainee in a secret hearing at which neither the detainee nor his counsel is present. The detainee receives only a summary of the evidence against him. I discuss this legal situation as a state of exception that is part of a legal structure in which non-citizens have fewer rights than do citizens. Two conceptual tools shape my understanding of security certificates and their use in the “war on terror”: race thinking and the state of exception. The five detainees are more than simply victims of racial profiling. Their Arab origins, and the life history that mostly Arab Muslim men have had, operate to mark them as individuals likely to commit terrorist acts, people whose propensity for violence is indicated by their origins. When race thinking, the belief in the division of humanity into those prone to violence and those who are not according to racial descent, is accompanied by the idea that there must be two different, hierarchical legal regimes for each, and when we begin to grow accustomed to places without law and to people to whom the rule of law does not apply, we enter the terrifying world of the colonies and the concentration camp. This article examines how a space where law is suspended operates in the “war on terror” and it attends to the work that ideas about race do in the environment of the exception.
Purpose – This chapter examines the process of radicalization, deradicalization, and support for intelligence agencies in a few well-known cases of terrorists who turned into…
Abstract
Purpose – This chapter examines the process of radicalization, deradicalization, and support for intelligence agencies in a few well-known cases of terrorists who turned into informants.
Methodology/Approach – Five cases studies are utilized to demonstrate the process of engagement in, disengagement from, and revolt against terrorist groups. Existing literature on radicalization and deradicalization is set against the context of these case studies.
Findings – By drawing upon the experiences of terrorists who turned into informants, it is possible to prove theories on radicalization and deradicalization. In particular, the process of cognitive radicalization presumes that extremist beliefs can also be rejected (deradicalization), while the process of behavioral radicalization presumes that terrorists can distance themselves from extremist behaviors (disengagement).
Originality/Value – Scholarship has traditionally focused on “underdogs” of all kinds, with a less keen interest in elites or the actors operating on their behalf. The work of informants has often remained in a dimly lit corner of academic research. This chapter helps illuminate the path undertaken by terrorists who become informants for Western security apparatus.
Details
Keywords
This paper aims to reconceptualise the literature on learning organisations, fourth blueprint management and entrepreneurialism to develop the idea of a global learning network.
Abstract
Purpose
This paper aims to reconceptualise the literature on learning organisations, fourth blueprint management and entrepreneurialism to develop the idea of a global learning network.
Design/methodology/approach
This notion is used to highlight successful leadership and management practices used by a transnational organisation to respond to change in a way that fosters entrepreneurial action.
Findings
The author has identified al‐Qaeda as a pertinent and timely example through which to examine this new perspective because of its unique culture and enabling structure that encourage members to act as both “environmental scanners” and agents of influence in affecting change.
Originality/value
The al‐Qaeda case study illustrates how the four elements of metastrategic design – namely: vision, identity, configuration, and action – can operate to sustain organisational learning and renewal for more conventional transnational organisations.
Details
Keywords
Nicholas Ridley and Dean C. Alexander
The purpose of this paper is to investigate the strategic intelligence oversights with regards to the funding of terrorism.
Abstract
Purpose
The purpose of this paper is to investigate the strategic intelligence oversights with regards to the funding of terrorism.
Design/methodology/approach
The paper considers the modus operandi of terrorist financing, and how and how speedily or otherwise they were identified, and the international and national anti‐terrorist financing measure implemented post 9/11.
Findings
The paper concludes that there were (and still are) strategic oversights, delays and distractions by government law enforcement and financial regulatory agencies in combating terrorist financing.
Practical implications
The paper suggests there should be more proactive exchange of intelligence by law enforcement and financial regulatory agencies in combating financing of terrorism.
Originality/value
The added value is lessons learned in international efforts against financing of terrorism.
Details
Keywords
The terrorist attacks on the United States on September 11, 2001 were a very traumatic event for the entire nation. This was especially true for law enforcement. Many law…
Abstract
Purpose
The terrorist attacks on the United States on September 11, 2001 were a very traumatic event for the entire nation. This was especially true for law enforcement. Many law enforcement officers and other first responders lost their lives in the initial response to the attack while attempting to save the lives of the citizens they were sworn to protect. As a result of the 9/11 attacks, many changes have occurred in the missions, operations and tactics of local law enforcement agencies in the United States.
Methodology/approach
This chapter attempts to examine the changes that were forced upon law enforcement by the events of 9/11 and to look at what the future might hold for law enforcement in an enhanced homeland security environment.
Findings
Terrorism presents additional duties for law enforcement. Traditional police missions have not been lessened, but new threats to the public have arisen.
Details
Keywords
Few articles have been published on counter‐terrorist finance (CTF) policies in the UK and fewer still have attempted to evaluate their effectiveness. This paper seeks to examine…
Abstract
Purpose
Few articles have been published on counter‐terrorist finance (CTF) policies in the UK and fewer still have attempted to evaluate their effectiveness. This paper seeks to examine both quantitative and qualitative aspects of the UK's CTF policies from open‐source materials and in doing so considers the credibility of many of the claims by those who have attempted to evaluate their effectiveness in light of the data gathered.
Design/methodology/approach
The paper presents an analysis of the UK's CTF regime.
Findings
There have been just over 100 convictions under terrorism legislation offence in Great Britain alone since 11 September 2001 resulting in at least ten individuals being convicted of a CTF offence. In terms of assets frozen or seized, Robinson appears to have a point when he argued that: “when you look closely at those frozen assets, you discover that most of them have been unfrozen”, given the tens of millions of pounds returned to the Afghan Government.
Originality/value
This paper will be of interest to academics, politicians, practitioners interested in the use of CTF policies.
Details
Keywords
This chapter analyses the degree to which the UK Higher Education (UKHE) Sector can offer spaces for students to critically reflect on topics relevant to activist criminology such…
Abstract
This chapter analyses the degree to which the UK Higher Education (UKHE) Sector can offer spaces for students to critically reflect on topics relevant to activist criminology such as zemiology or abolitionism as opposed to constructing the criminal justice system (CJS) as a natural solution for crimes and social harms. This chapter argues for the importance of this topic due to deepening institutional links between universities and criminal justice agencies in the name of professionalisation for the latter (Hallenberg & Cockroft, 2017). This chapter proposes that to avoid criminology curricula merely reproducing the priorities and solutions of the CJS, it should turn to the liberatory pedagogy of Paolo Freire (1996). This includes teaching practices to encourage recognition of social movements and resistance against harms of states, corporations, or the CJS as legitimate foci in the criminology curriculum.
Details
Keywords
In asymmetrical wars the asymmetry does not refer to a quantitative difference in belligerants’ strength or power, but to the qualitative differences in means, behavioral…
Abstract
In asymmetrical wars the asymmetry does not refer to a quantitative difference in belligerants’ strength or power, but to the qualitative differences in means, behavioral standards, goals, and values of conflicting parties. In the asymmetrical conflicts it seems that war functions have changed.
The purpose of this paper is to put in evidence the various expertises and skills that a soldier must have to operate in such a changed context.
In order to reach this purpose, the diversity model has been applied to the new conflicts, as already used to analyze the difference between CROs and the traditional soldiers’ job. To these respect, the definition of the further evolution of the role of a soldier called upon to intervene in the new operational environments can be considered as a preliminary finding: such a soldier must always be flexible and able to operate in a Constabulary context, but with more points in common with the warrior ideal type than with the peacekeeper one. A soldier who has to be able to gear his action in terms not of “dissymmetry” but of asymmetry as defined above. This implies a perception of the qualitative as well as quantitative differences in their own characteristics and in those of the adversary. In particular behavioral style, values, and strategic culture. However, there is no question of a return to the past, but the latest evolution in the range of flexible soldier that is so important in the asymmetric conflicts.
Practical implications of this analysis are bound to offer a deeper understanding of the events concerning asymmetrical conflicts, in the education as well as training of soldiers deployed in these kinds of conflict theaters.