Search results

1 – 10 of 168
Article
Publication date: 2 January 2018

Patrick J. O’Halloran, Christian Leuprecht, Ali Ghanbar Pour Dizboni, Alexandra Green and David Adelstein

This paper aims to examine whether the money laundering/terrorist financing (ML/TF) model excludes important aspects of terrorist resourcing and whether the terrorist resourcing…

Abstract

Purpose

This paper aims to examine whether the money laundering/terrorist financing (ML/TF) model excludes important aspects of terrorist resourcing and whether the terrorist resourcing model (TRM) provides a more comprehensive framework for analysis.

Design/methodology/approach

Research consisted of case studies of resourcing activities of four listed terrorist organizations between 2001 and 2015: the Liberation Tigers of Tamil Eelam (LTTE), Hamas, a grouping of Al Qaeda-inspired individuals and entities under the heading “Al Qaeda inspired” and Hezbollah.

Findings

The most prevalent resourcing actors observed were non-profit organizations/associations, and the most prevalent form of resourcing was fundraising that targeted individual cash donations of small amounts. Funds were pooled, often passed through layers of charitable organizations and transmitted through chartered banks. The TRM is indeed found to provide a more comprehensive framework for identifying sources of resourcing and points of intervention. However, it does not in itself recommend effective means of response but it has implications for counter-resourcing strategies because it identifies resourcing actors and nodes where counter-resourcing could occur.

Originality/value

This paper advances the state of knowledge of terrorist resourcing activities in Canada and about the value of doing so through the analytical lens of the TRM as opposed to the predominant ML/TF model.

Details

Journal of Money Laundering Control, vol. 21 no. 1
Type: Research Article
ISSN: 1368-5201

Keywords

Book part
Publication date: 10 April 2007

Sherene H. Razack

I discuss the case of Hassan Almrei, one of the five Arab men detained as suspects who have the potential to engage in terrorism. Hassan Almrei's detention arises out of a section…

Abstract

I discuss the case of Hassan Almrei, one of the five Arab men detained as suspects who have the potential to engage in terrorism. Hassan Almrei's detention arises out of a section of the Immigration and Refugee Protection Act of Canada that authorizes security certificates. A security certificate permits the detention and expulsion of non-citizens who are considered to be a threat to national security. Detainees have no opportunity to be heard before a certificate is issued and a designated judge of the Federal Court reviews most of the government's case against the detainee in a secret hearing at which neither the detainee nor his counsel is present. The detainee receives only a summary of the evidence against him. I discuss this legal situation as a state of exception that is part of a legal structure in which non-citizens have fewer rights than do citizens. Two conceptual tools shape my understanding of security certificates and their use in the “war on terror”: race thinking and the state of exception. The five detainees are more than simply victims of racial profiling. Their Arab origins, and the life history that mostly Arab Muslim men have had, operate to mark them as individuals likely to commit terrorist acts, people whose propensity for violence is indicated by their origins. When race thinking, the belief in the division of humanity into those prone to violence and those who are not according to racial descent, is accompanied by the idea that there must be two different, hierarchical legal regimes for each, and when we begin to grow accustomed to places without law and to people to whom the rule of law does not apply, we enter the terrifying world of the colonies and the concentration camp. This article examines how a space where law is suspended operates in the “war on terror” and it attends to the work that ideas about race do in the environment of the exception.

Details

Studies in Law, Politics and Society
Type: Book
ISBN: 978-0-7623-1324-2

Book part
Publication date: 9 September 2020

Stefano Bonino

Purpose – This chapter examines the process of radicalization, deradicalization, and support for intelligence agencies in a few well-known cases of terrorists who turned into…

Abstract

Purpose – This chapter examines the process of radicalization, deradicalization, and support for intelligence agencies in a few well-known cases of terrorists who turned into informants.

Methodology/Approach – Five cases studies are utilized to demonstrate the process of engagement in, disengagement from, and revolt against terrorist groups. Existing literature on radicalization and deradicalization is set against the context of these case studies.

Findings – By drawing upon the experiences of terrorists who turned into informants, it is possible to prove theories on radicalization and deradicalization. In particular, the process of cognitive radicalization presumes that extremist beliefs can also be rejected (deradicalization), while the process of behavioral radicalization presumes that terrorists can distance themselves from extremist behaviors (disengagement).

Originality/Value – Scholarship has traditionally focused on “underdogs” of all kinds, with a less keen interest in elites or the actors operating on their behalf. The work of informants has often remained in a dimly lit corner of academic research. This chapter helps illuminate the path undertaken by terrorists who become informants for Western security apparatus.

Details

Radicalization and Counter-Radicalization
Type: Book
ISBN: 978-1-83982-988-8

Keywords

Article
Publication date: 1 February 2005

Matthew Harrison

This paper aims to reconceptualise the literature on learning organisations, fourth blueprint management and entrepreneurialism to develop the idea of a global learning network.

2159

Abstract

Purpose

This paper aims to reconceptualise the literature on learning organisations, fourth blueprint management and entrepreneurialism to develop the idea of a global learning network.

Design/methodology/approach

This notion is used to highlight successful leadership and management practices used by a transnational organisation to respond to change in a way that fosters entrepreneurial action.

Findings

The author has identified alQaeda as a pertinent and timely example through which to examine this new perspective because of its unique culture and enabling structure that encourage members to act as both “environmental scanners” and agents of influence in affecting change.

Originality/value

The alQaeda case study illustrates how the four elements of metastrategic design – namely: vision, identity, configuration, and action – can operate to sustain organisational learning and renewal for more conventional transnational organisations.

Details

Foresight, vol. 7 no. 1
Type: Research Article
ISSN: 1463-6689

Keywords

Article
Publication date: 1 January 2012

Nicholas Ridley and Dean C. Alexander

The purpose of this paper is to investigate the strategic intelligence oversights with regards to the funding of terrorism.

2802

Abstract

Purpose

The purpose of this paper is to investigate the strategic intelligence oversights with regards to the funding of terrorism.

Design/methodology/approach

The paper considers the modus operandi of terrorist financing, and how and how speedily or otherwise they were identified, and the international and national anti‐terrorist financing measure implemented post 9/11.

Findings

The paper concludes that there were (and still are) strategic oversights, delays and distractions by government law enforcement and financial regulatory agencies in combating terrorist financing.

Practical implications

The paper suggests there should be more proactive exchange of intelligence by law enforcement and financial regulatory agencies in combating financing of terrorism.

Originality/value

The added value is lessons learned in international efforts against financing of terrorism.

Book part
Publication date: 11 September 2015

Gregg W. Etter

The terrorist attacks on the United States on September 11, 2001 were a very traumatic event for the entire nation. This was especially true for law enforcement. Many law…

Abstract

Purpose

The terrorist attacks on the United States on September 11, 2001 were a very traumatic event for the entire nation. This was especially true for law enforcement. Many law enforcement officers and other first responders lost their lives in the initial response to the attack while attempting to save the lives of the citizens they were sworn to protect. As a result of the 9/11 attacks, many changes have occurred in the missions, operations and tactics of local law enforcement agencies in the United States.

Methodology/approach

This chapter attempts to examine the changes that were forced upon law enforcement by the events of 9/11 and to look at what the future might hold for law enforcement in an enhanced homeland security environment.

Findings

Terrorism presents additional duties for law enforcement. Traditional police missions have not been lessened, but new threats to the public have arisen.

Details

Terrorism and Counterterrorism Today
Type: Book
ISBN: 978-1-78560-191-0

Keywords

Article
Publication date: 12 October 2010

Peter A. Sproat

Few articles have been published on counter‐terrorist finance (CTF) policies in the UK and fewer still have attempted to evaluate their effectiveness. This paper seeks to examine…

1896

Abstract

Purpose

Few articles have been published on counter‐terrorist finance (CTF) policies in the UK and fewer still have attempted to evaluate their effectiveness. This paper seeks to examine both quantitative and qualitative aspects of the UK's CTF policies from open‐source materials and in doing so considers the credibility of many of the claims by those who have attempted to evaluate their effectiveness in light of the data gathered.

Design/methodology/approach

The paper presents an analysis of the UK's CTF regime.

Findings

There have been just over 100 convictions under terrorism legislation offence in Great Britain alone since 11 September 2001 resulting in at least ten individuals being convicted of a CTF offence. In terms of assets frozen or seized, Robinson appears to have a point when he argued that: “when you look closely at those frozen assets, you discover that most of them have been unfrozen”, given the tens of millions of pounds returned to the Afghan Government.

Originality/value

This paper will be of interest to academics, politicians, practitioners interested in the use of CTF policies.

Details

Journal of Money Laundering Control, vol. 13 no. 4
Type: Research Article
ISSN: 1368-5201

Keywords

Book part
Publication date: 9 August 2023

Aidan O’Sullivan

This chapter analyses the degree to which the UK Higher Education (UKHE) Sector can offer spaces for students to critically reflect on topics relevant to activist criminology such…

Abstract

This chapter analyses the degree to which the UK Higher Education (UKHE) Sector can offer spaces for students to critically reflect on topics relevant to activist criminology such as zemiology or abolitionism as opposed to constructing the criminal justice system (CJS) as a natural solution for crimes and social harms. This chapter argues for the importance of this topic due to deepening institutional links between universities and criminal justice agencies in the name of professionalisation for the latter (Hallenberg & Cockroft, 2017). This chapter proposes that to avoid criminology curricula merely reproducing the priorities and solutions of the CJS, it should turn to the liberatory pedagogy of Paolo Freire (1996). This includes teaching practices to encourage recognition of social movements and resistance against harms of states, corporations, or the CJS as legitimate foci in the criminology curriculum.

Details

The Emerald International Handbook of Activist Criminology
Type: Book
ISBN: 978-1-80262-199-0

Keywords

Book part
Publication date: 15 October 2008

Eraldo Olivetta

In asymmetrical wars the asymmetry does not refer to a quantitative difference in belligerants’ strength or power, but to the qualitative differences in means, behavioral…

Abstract

In asymmetrical wars the asymmetry does not refer to a quantitative difference in belligerants’ strength or power, but to the qualitative differences in means, behavioral standards, goals, and values of conflicting parties. In the asymmetrical conflicts it seems that war functions have changed.

The purpose of this paper is to put in evidence the various expertises and skills that a soldier must have to operate in such a changed context.

In order to reach this purpose, the diversity model has been applied to the new conflicts, as already used to analyze the difference between CROs and the traditional soldiers’ job. To these respect, the definition of the further evolution of the role of a soldier called upon to intervene in the new operational environments can be considered as a preliminary finding: such a soldier must always be flexible and able to operate in a Constabulary context, but with more points in common with the warrior ideal type than with the peacekeeper one. A soldier who has to be able to gear his action in terms not of “dissymmetry” but of asymmetry as defined above. This implies a perception of the qualitative as well as quantitative differences in their own characteristics and in those of the adversary. In particular behavioral style, values, and strategic culture. However, there is no question of a return to the past, but the latest evolution in the range of flexible soldier that is so important in the asymmetric conflicts.

Practical implications of this analysis are bound to offer a deeper understanding of the events concerning asymmetrical conflicts, in the education as well as training of soldiers deployed in these kinds of conflict theaters.

Details

Armed Forces and Conflict Resolution: Sociological Perspectives
Type: Book
ISBN: 978-1-8485-5122-0

Abstract

Details

Challenges of the Muslim World
Type: Book
ISBN: 978-0-444-53243-5

1 – 10 of 168