The Geography of International terrorism



Similar documents
GEOGRAPHY 3320/5320 Geography of Terrorism and Homeland Security George F. Hepner

Ctfo MANAGEMENT SECURITY PATCH. Felicia M. Nicastro. Second Edition. CRC Press. VC#*' J Taylor & Francis Group / Boca Raton London New York

Information Technology and Organizational Learning

Development and Management

Globalization of Security Threat Groups (CJSA 2371) Online. Credit: 3 semester credit hours (3 hours lecture)

EFFECTIVE NON-PROFIT MANAGEMENT

Supply Chain Risk. An Emerging Discipline. Gregory L. Schlegel. Robert J. Trent

Implementing the Project Management Balanced Scorecard

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, p i.

RESILIENT. SECURE and SOFTWARE. Requirements, Test Cases, and Testing Methods. Mark S. Merkow and Lakshmikanth Raghavan. CRC Press

SOFTWARE TESTING AS A SERVICE

THE COMPLETE PROJECT MANAGEMENT METHODOLOGY AND TOOLKIT

Customer and Business Analytic

Introduction to Supply Chain Management Technologies

Improving Business Process Performance

Advances in Network Management

Illicit Drug Trafficking and Islamic Terrorism as Threats to Russian Security

Good morning. It is my pleasure to be here today as we begin. this workshop on improving regional responses to transnational

SECOND EDITION THE SECURITY RISK ASSESSMENT HANDBOOK. A Complete Guide for Performing Security Risk Assessments DOUGLAS J. LANDOLL

Lean Management System LMS:2OI2

Management. ITIL Release. Dave Howard. A Hands-on Guide. CRC Press. Taylor & Francis Group. Taylor St Francis Croup, an Informa business

Design of Enterprise Systems

ANDROID SECURITY ATTACKS AND DEFENSES ABHISHEK DUBEY I ANMOL MISRA. ( r öc) CRC Press VV J Taylor & Francis Group ^ "^ Boca Raton London New York

Study Guide. ScrumMaster. The. James Schiel. CRC Press. Taylor & Francis Croup, an Inform* business AN AUERBACH BOOK. CRC Press (s an imprint of the

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Warning Signs and the Red Flag System

Implementation. Business-Driven IT-Wide Agile (Scrum) and Kanban (Lean) Andrew T. Pham and David K. Pham. An Action Guide for Business and IT Leaders

It is well known that drug prohibition has created a lucrative. War on two fronts. The global convergence of terrorism and narcotics trafficking

Management. Project. Software. Ashfaque Ahmed. A Process-Driven Approach. CRC Press. Taylor Si Francis Group Boca Raton London New York

The Green and Virtual Data Center

Engineering Design. Software. Theory and Practice. Carlos E. Otero. CRC Press. Taylor & Francis Croup. Taylor St Francis Croup, an Informa business

CREATING A THIRD EDITION DAVID MANN

Cloud Computing. and Scheduling. Data-Intensive Computing. Frederic Magoules, Jie Pan, and Fei Teng SILKQH. CRC Press. Taylor & Francis Group

THE MODERN THEORY OF THE TOYOTA PRODUCTION SYSTEM

CHAPMAN & HALL/CRC INNOVATIONS IN SOFTWARE ENGINEERING AND SOFTWARE DEVELOPMENT. Software Test Attacks to Break Mobile and Embedded Devices

TOYOTA. by TOYOTA. Reflections from the Inside Leaders on the Techniques That Revolutionized the Industry. Edited by Samuel Obara and Darril Wilburn

Computer Security Literacy

EASTERN KENTUCKY UNIVERSITY

Deliuery Networks. A Practical Guide to Content. Gilbert Held. Second Edition. CRC Press. Taylor & Francis Group

BIOTECHNOLOGY OPERATIONS

Networking. Cloud and Virtual. Data Storage. Greg Schulz. Your journey. effective information services. to efficient and.

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the

Negotiating the Nation: Diaspora Contestations about Hindu Nationalism in India Nations and Nationalism 16(4):

Quality Management. Theory and Application PETER D. MAUCH. Ltfi) CRC Press. \ V J Taylor & Francis Group. ^ ^ Boca Raton London New York

Program Learning Objectives

TABLE OF CONTENTS CHAPTER TITLE PAGE

Security Vulnerability Assessment

Training Courses Catalog 2015

BUSINESS ANALYSIS FDR INTELLIGENCE

Cloud Computing. Implementation, Management, and Security. John W. Rittinghouse James F. Ransome

Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup

Ethics for International Business

Homeland Security Graduate Programs

THE TRADING WORLD OF ASIA AND THE ENGLISH EAST INDIA COMPANY

Requirements Engineering for Software

Introduction to the International Humanitarian Law of Armed Conflicts

Assessment of the terror threat to Denmark

U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY. +$106.8 Million in Program Increases. FY 2016 Overview

Adewale Banjo, PhD. Adewale Banjo 2013 UNISA Schoolof Business Leadership 1

How To Study Political Science At Pcj.Edu

Policy Instruments & (Side)-Effects

Assessment of the Terror Threat to Denmark

SCHOOL OF GLOBAL STUDIES DEPARTMENT OF INTERNATIONAL RELATIONS. Taught Masters programmes

for Research and Guiding Innovation for Positive R&D Outcomes Lory Mitchell Wingate

CLINICAL DATA MANAGEMENT

Countering Violent Extremism (CVE) Working Group Community-Oriented Policing Workshop 22 March 2013 United States Institute of Peace Washington

Governance Simplified

Business Information Systems and Technology

TENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY TENNESSEE OFFICE OF HOMELAND SECURITY

Handbook of Globalization, Governance, and Public Administration

Understanding Organizational Change

Cyber Attacks. Protecting National Infrastructure Student Edition. Edward G. Amoroso

Global Supply Chain Management and International Logistics

Curriculum Vitae. Mark C. Anarumo, Ph.D. National Security Fellow, May 2012 John F. Kennedy School of Government, Harvard University

Standards Addressed by The Choices Program

An Introduction to Cyber Crime and Terrorism: Problems and the Challenges

Project Management Concepts, Methods, and Techniques

AT A HEARING ENTITLED THREATS TO THE HOMELAND

COURSE SYLLABUS Southeast Missouri State University. Department of Management and Marketing Organization Theory and Design Revision: Spring 2014

I Fundraising. Management. Analysis, planning and practice. Adrian Sargeant and Elaine Jay. Second edition. Routledge. Taylor Si Francis Croup

A Simulation-Based lntroduction Using Excel

Strategic Focus Report Enterprise Mobility

STATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK COURSE OUTLINE EADM 220 DISASTER MANAGEMENT AND PREPAREDNESS

Building Resilience Against Terrorism CANADA S COUNTER-TERRORISM STRATEGY

Japan and Its Occupied Territories During World War II

The Plight of Christians in the Middle East. Supporting Religious Freedom, Pluralism, and Tolerance During a Time of Turmoil

THE PREPARATION AND OPERATIONAL ACTIVITIES OF ALLIED AND HUNGARIAN MILITARY SECURITY FORCES AGAINST INTERNATIONAL TERRORISM

Transcription:

SUB Hamburg A/596060 The Geography of International terrorism An Introduction to Spaces and Places of Violent Non-State Groups Richard M. Medina and George F. Hepner CRC Press Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an Informa business

Contents Preface The Authors xi xiii Chapter 1 The' Links between Terrorism and Geography 1 Introduction 1 Brief Account of Geography of Present-Day Terrorism in Nigeria 2 The South 3 The North 6 Denning Terrorism 9 Terrorists, Insurgents, or Criminals? 11 Geography of the Definition 12 Motivations for Terrorism 15 Nationalist/Separatist 15 Cultural/Religious 16 Ideological 17 Context of Present-Day International Terrorism 19 Where Is Terrorism Located Today? 21 Geography, Theories of Space and Place, and Applications to Terrorism Research 23 Spaces of Terrorism 26 Geographic Space 26 Social Space 26 Virtual Space 27 Perceptual Space 30 Hybrid Space 32 Terrorist Places, Migrations, and Activities 33 Havens and Safe Houses 33 Safe Houses 35 Migrations 36 Migrations Driving Terrorism 38 Migrations Resulting from Terrorism 38 Diasporas and the Homegrown Threat 39

vi Contents Scales of Terrorist Operations, Attacks, and Influence 42 Terrorist Attacks and Impacts on Near and Far Targets 43 c " Attack Patterns in Geographic Space 45 The Four Traditions of Geography and Their Applications to Terrorism Research 45 Geographic Theories of Territory and Conflict 47 Heartland Theory 47 The" Evolution of the Insurgent State 48 ConflictSpace 49 Resident versus Foreign Fighter Terrorists: A Geospatial Concept 51 Geospatial Information and Technologies in the Context of Terrorism and Security 52 Geospatial Information 53 Global Positioning System 53 Remote Sensing 53 Geographic Information Systems (GIS) 54 References 56 Chapter 2 Terrorist Networks in Geographic-Social Hybrid Space... 63 Introduction 63 Hybrid Space: The Intersection of Spaces 69 Terrorist Networks and Their Organizational Structures...72 Hierarchical Terrorist Network Structure 73 The Provisional Irish Republican Army 73 Hezbollah (The Party of God) 75 Decentralized Terrorist Network Structure 78 Globalization and Terrorist Network Decentralization...79 Benefits and Disadvantages of Decentralization 80 Euskadi Ta Askatasuna (ETA) (Basque Fatherland and Freedom) 81 Al-Qaeda (The Base) and the Decentralized Islamist Terrorist System 83 Leaderless Resistance and Multiple Leaders: Models of Advanced Decentralization 87 The Connection between the Global Jihad and Leaderless Resistance 90 Homegrown Terrorism 91

" Contents vii Terrorist Networks Flows 92 The Flow of Ideas and Information and Principles of Communication in the Information Age 93 ^Terrorists' Use of the Internet and the World Wide Web...94 Psychological Warfare 95 Transfer of Information and Data Collection 96 Fundraising 97 Recruitment and Mobilization 97 Material Flows 98 Flows of Goods and Money 98 The Hawala System of Money Transfer 99 Drug Production and Trafficking 100 Flows of People and Geographic Paths to Radicalization 100 References 103 Chapter 3 The Geography of Terrorism, Aspirational Geography, and Safe Havens 109 Introduction 109 Geography of Aspirational Homelands 110 Kurdistan Ill Political and Geographical Borders 114 The Insurgent State as a Home for Terrorists 117 Naxalites in India 119 Havens for Terrorist Groups 121 Geographic Haven 122 Geographical Factors 124 Urban Havens 126 Other Attributes of Havens 127 Tamil Tigers of Sri Lanka 127 Measures to Diminish Geographic Safe Havens 129 References 134 Chapter 4 Sociocultural Understanding, Geospatial Data/Technologies, and Opportunities for Countering Terrorism 137 Introduction 137

viii Contents, The Importance of Sociocultural Understanding (Human Geography) on Global Scale to Local Scale 139 Geospatial Intelligence: The Integration of Human Geography and Geospatial Technologies 140 * The US Army Human Terrain System 142 Human Terrain Shift to Human Geography 145 Technology and War 145 Technologies of Geospatial Intelligence and Their Use in Terrorism and Counter terrorism 147 Geographic Data as Geospatial Information 148 Geographic Information Systems 149 Analyzing the Connections between Social and Geographic Space Activities 151 GIS-Based Spatial Analysis and Visualization of Terrorist Attacks 155 Viewshed Analysis: Line of Sight 159 Global Positioning System 160 Remote Sensing 162 Volunteered Geographic Information and Data Mining 167 Mobile Phones and the Ubiquity of Spatial Information and Tools 170 Geosensors and Geosensor Networks 172 Use of Geospatial Data/Information and Tools by Terrorists 174 Criteria for Publicly Available Geospatial Information 176 Final Thoughts on Geospatial Intelligence and Terrorism... 178 References 181 Chapter 5 Terrorism Risk and Vulnerability 185 Terrorism as a Hazard 185 Hazard as an Evolving Interaction of Risk and Vulnerability. 186 Risk 187 Vulnerability. 188 The BNICE Possibilities Geographical Implications 189 Actions to Diminish Risk of and Vulnerability to Terrorist Attacks 192

Contents ix Effective Planning and Response to Minimize Vulnerability 194 Infrastructure Vulnerability 195 ^Social Vulnerability 196 Mapping Vulnerabilities Using Dynamic Populations...197 Reduction of the Terrorist Hazard and Homeland Security 200 References 201 Chapter 6 Influences on the Future Geography of Terrorism 203 Global Influences on the Location of Conflict 203 Global Environmental Change 205 Changes in Water Supply 206 Coastal and Estuarine Inundation 209 Indirect Consequences of Environmental Change 210 Migration 211 The Environmental Change-Conflict Nexus 212 Globalization and Terrorism 212 State Weakness and Vulnerability to Terrorism 213 Becoming Connected to the Globalizing World 215 Marginalized Regions and the Potential for Terror 216 Sub-Saharan Africa 217 Central and South America 218 The Middle East and North Africa 219 Southeast Asia 220 Eastern Europe 221 Globalization and Spatial Redistributions of People and Ideas 221 The Spread of Organizations 223 References 224 Index 227