Oil Disruptions Threaten National Security
by Anthony L. Kimery
Monday, 18 August 2008
http://hstoday.us/index2.php?option=com_content&task=view&id=4750&pop=1&page=0&Itemid=150
' ... once a crisis occurs, America's hands are tied'
Editor's Note: This is Part One of a two-part series that explores US energy security. Part One examines the possibility and impact of a prolonged disruption of foreign oil imports to the US.
This past year, the Office of Director of National Intelligence presciently warned US lawmakers that the inevitable escalation of global competition between the world’s superpowers for dwindling strategic oil and gas reserves could devolve into the most important geo-strategic antagonism of the 21-Century, with horrific consequences for US homeland and national security.
===
Al Qaeda's Forest Gump
http://wwwwbipicomlink.blogspot.com/2008/08/mohammed-junaid-babar-forest-gump-of-al.html
Syed Hashmi, a 29-year-old US citizen and former student at Brooklyn College NYC , is in solitary at the Federal Pen NYC on charges of providing material support to Al Qaida. Hashmi could face as much as 70 years in prison. In June 2006, Hashmi was arrested by British security personnel at Heathrow Airport, where he was waiting for a flight to Pakistan where he was to visit relatives. Eleven months later, Hashmi was extradited to the US, where he was placed in the Metropolitan Correctional Center in Manhattan under isolation.
===
Obama's Fascist police push ABC reporter off public sidewalk, across street where five cops gang up on him--dig the cop with the cigar putting the choke on--
The reporter was on the trail of the Obama money-man who is paying off John Edward's mistress, and Andrew Young the patsy who is claiming to have fathered John Edward's child with the mistress--
Behold the first inkling that Obama is a demagogue who will trample the Constitution, break eggs to make Bill Ayers' omelet of Communism--
http://abcnews.go.com/Blotter/Conventions/story?id=5668622&page=1
===
Sunday, August 31, 2008
Saturday, August 30, 2008
VARIOUS NEWS VIEWS
Kill! Kill! Kill! In British mosques
Britain's leading Muslim bodies say they are fighting extremism. In one of our most respected mosques, Sara Hassan came face to face with hardline female preachers of separatism.
What should be done to a Muslim who converts to another faith? "We kill him," she says, "kill him, kill, kill…You have to kill him, you understand?"
What should be done to a Muslim who converts to another faith? "We kill him," she says, "kill him, kill, kill…You have to kill him, you understand?"
Adulterers, she says, are to be stoned to death - and as for homosexuals, and women who "make themselves like a man, a woman like a man ... the punishment is kill, kill them, throw them from the highest place".
These punishments, the preacher says, are to be implemented in a future Islamic state. "This is not to tell you to start killing people," she continues. "There must be a Muslim leader, when the Muslim army becomes stronger, when Islam has grown enough.
...
One speaker says of the Jews: "Their time will come, like every other evil person's time will come." Another speech, this time by Sheikh Khalid Yasin, who learned Arabic in Saudi Arabia, praised the deterrent effect of sharia law: "
...
One speaker says of the Jews: "Their time will come, like every other evil person's time will come." Another speech, this time by Sheikh Khalid Yasin, who learned Arabic in Saudi Arabia, praised the deterrent effect of sharia law: "
Then people can see, people without hands, people can see in public heads rolling down the street, people got [sic] their hands and feet from opposite sides chopped off and they see them crucified…they see people put up against the pole and see them get lashed in public they see it, and because they see it, it acts as a deterrent for them because they say I don't want that to happen to me."
All members of Tower Hamlets Council in east London, where 36 per cent of the population follows Islam, were sent an email asking them to abide by the restrictions observed by strict Muslims during the holy month.
They have also been told that the town hall's business agenda will be reduced throughout Ramadan to accommodate Muslims, with only seven committee meetings scheduled and special prayer breaks included in the evening events.
Tower Hamlets Council has previously insisted that staff call their Christmas meal the "festive lunch" and replaced Bonfire Night celebrations with a show based on a Bengali folk tale.
The Bidens!
A son and a brother of Sen. Joseph R. Biden Jr. (D-Del.), Democratic Vice-Presidential candidate, are accused in two lawsuits of defrauding a former business partner and an investor of millions of dollars in a suspect hedge fund deal that went sour, court records show.
BIDEN MAKES OBAMA TICKET EVEN MORE RISKY
Republican Jewish Coalition (RJC) Executive Director Matt Brooks issued the following statement today: "With the selection of Senator Joe Biden as Senator Obama's vice president, the Democrat's ticket has now become an even greater gamble for the Jewish community.
Throughout his career, Senator Biden has consistently been wrong on Iran and his voting record on Israel has been inconsistent. Like Obama, Biden fundamentally misunderstands the threat posed by an Iran determined to obtain nuclear weapons.
Biden has continuously demonstrated poor judgment on Iran. He has voted against significant legislation that would pressure Iran to stop pursuing nuclear weapons.
Biden has failed to recognize the serious threat that Iran poses to Israel and the US and its allies in the Middle East," said RJC Executive Director Matt Brooks.
In 1998, Sen. Biden was one of only four senators to vote against the Iran Missile Proliferation Sanctions Act, a bill that punished foreign companies or other entities that sent Iran sensitive missile technology or expertise.
Biden was one of the few senators to oppose the bipartisan 2007 Kyl-Lieberman Amendment labeling the Iranian Revolutionary Guard a terrorist organization.
In a December 2007 debate, Biden said "Iran is not a nuclear threat to the United States of America." On MSNBC's "Hardball," Biden said he "never believed" Iran had a weapon system under production.
"The Jewish community was already gravely concerned with Senator Obama's naïve understanding of the Iranian threat. An Obama-Biden ticket has proven that it is ill-equipped to deal with this threat.
By selecting Senator Biden to join his ticket, voting for Senator Obama has now become an even greater risk," said Brooks.
Monday, August 25, 2008
OBAMA & FREE SPEECH FRIENDS
AIM Column By Andrew Walden
Why aren’t the American media investigating the role of British billionaire businessman Nadhmi Auchi in supplying loans to Barack Obama fundraiser Tony Rezko?
Some point to media bias, but there is another factor.
Working for Auchi, who was born in Iraq, attorneys from London law firm Carter-Ruck have for several months been flooding American and British newspapers and websites with letters demanding removal of material they deem “defamatory” to their client.
In its June 28 edition, British satirical magazine Private Eye explains: “Until Carter-Ruck and Partners and England’s stifling libel laws got to work, the few American journalists not caught up in Obama-mania were turning to the archives of the British press to answer an intriguing question: who is Nadhmi Auchi?”
What is so “stifling” about English libel law? In the U.K., as Carter-Ruck explains on its own website, “A libel claimant does not have to prove that the words are false or to prove that he has in fact suffered any loss. Damage is presumed.”
The Obama campaign recently issued a non-denial denial in response to claims that Obama met with Auchi―contained in Jerome Corsi’s bestseller, The Obama Nation.
They cited only two references. One is, “Mr. Auchi’s lawyer” who told the February 27, 2008 London Evening Standard, “As far as he can remember he has had no direct contact with Mr. Obama.”
Another is, “A lawyer for Auchi, Alasdair Pepper” who says, according to the April 16, 2008 Washington Post, “Auchi Had ‘No Recollection’ Of Meeting Obama or Michelle.” Alasdair Pepper is the attorney whose name appears on the Carter-Ruck demand letters.
The Secret Loan
A secret $3.5 million loan from an Auchi company to key early-money Barack Obama fundraiser Antoin Rezko was exposed while Rezko was awaiting trial on fraud and money-laundering charges earlier this year. Rezko’s bail was revoked and police showed up banging on the doors of his Wilmette Chicago mansion to drag him off to jail early in the morning of January 28th.
Auchi’s loan to Rezko had come on May 23, 2005 but had not been disclosed to the Court as required in his bail agreement. Three weeks later, on June 15, 2005, Rezko’s wife assisted the Obamas in the purchase of their South Chicago mansion by purchasing a next-door undeveloped lot being sold with the house.
According to the Times of London, “Mr. Rezko’s lawyer said his client had ‘longstanding indebtedness’ to Mr. Auchi’s General Mediterranean Holding (GMH). By June 2007 he owed it $27.9 million. Under a Loan Forgiveness Agreement described in court, M. Auchi lent Mr. Rezko $3.5 million in April 2005 and $11 million in September 2005, as well as $3.5 million transferred in April 2007.
That agreement provided for the outstanding loans to be ‘forgiven’ in return for a stake in the 62-acre Riverside Park development.”
Rezko’s relationship with Barack Obama goes back to at least 1990, when Obama’s law firm did work relating to thousands of now-decaying Rezko apartment units in South Chicago. Rezko was a key early-money fundraiser in Obama’s state Senate campaigns and his failed run at the U.S. Congress.
According to The Times of London, “Mr. Auchi first met Mr. Rezko after the 2003 Iraq war and they have a business relationship.” At the time Auchi was facing the possibility of extradition to France. The Times of London explains: “Mr Auchi was convicted of corruption, given a suspended sentence and fined £1.4 million in France in 2003 for his part in the Elf affair, described as the biggest political and corporate scandal in post-war Europe.
He, in a statement from his media lawyers, claims he is appealing against the sentence.”
In 2003, Nick Cohen of the UK Guardian wrote:
Allow me to introduce you to Nadhmi Auchi. He was charged in the 1950s with being an accomplice of Saddam Hussein, when the future tyrant was acquiring his taste for blood. He was investigated in the 1980s for his part in alleged bribes to the fabulously corrupt leaders of post-war Italy.
Allow me to introduce you to Nadhmi Auchi. He was charged in the 1950s with being an accomplice of Saddam Hussein, when the future tyrant was acquiring his taste for blood. He was investigated in the 1980s for his part in alleged bribes to the fabulously corrupt leaders of post-war Italy.
In the 1990s, the Belgium Ambassador to Luxembourg claimed that Auchi’s bank held money Saddam and Colonel Gadaffi had stolen from their luckless peoples. In 2002, officers from the Serious Fraud Squad raided the offices of one of Auchi’s drug companies as part of an investigation of what is alleged to be the biggest swindle ever of the (British National Health Service).
With allegations, albeit unproven, like these hanging over him, wouldn’t you think that British MPs would have the sense to stay away?
But after threats from Carter-Ruck, Cohen’s “defamatory” article became one of six Guardian and Observer articles scrubbed from the Internet this April.
Blogger “A Jacksonian” received a similar demand on or before June 24. His article is still up. It details much of the information contained in the six deleted Guardian/Observer articles.
Source of Wealth
Auchi in 1967 began an Iraq Oil Ministry career eventually rising to be Director of Planning and Development under the Baathist dictatorship. He formed GMH in 1979 and then left Iraq. A key source of weapons procurement for Iraq during the Iran-Iraq war, GMH became the largest single private shareholder of Banque Nationale du Paris (BNP) which later merged with Paribas to form BNP-Paribas.
BNP and BNP-Paribas, at Saddam Hussein’s insistence, handled all Oil-for-Food transactions until 2001 when the incoming administration of George W. Bush demanded change.
Investigative journalist Bill Gertz explains:
“A 2004 Pentagon report obtained by The Washington Times identified Auchi as a global arms dealer and Iraqi billionaire ‘who, behind the facade of legitimate business, served as Saddam Hussein’s principle (sic) international financial manipulator and bag man.’
“A 2004 Pentagon report obtained by The Washington Times identified Auchi as a global arms dealer and Iraqi billionaire ‘who, behind the facade of legitimate business, served as Saddam Hussein’s principle (sic) international financial manipulator and bag man.’
“The report to the Pentagon inspector general stated that … ‘significant and credible evidence has been developed that Nadhmi Auchi has engaged in unlawful activities working closely with Iraqi intelligence operatives to, Bribe foreign governments and individuals prior to Operation Iraqi Freedom to turn opinion against the American-led mission to remove Saddam Hussein.’”
The web scrubbing did not stop with the six Guardian/Observer articles.
New Statesman writer Martin Bright reports that Auchi lawyers “have written to ask us to remove the names of the articles concerned.” Removed, the six titles are now available for reading only in difficult-to-find independent web archives:
“Labour blocks extradition of Iraqi tycoon” Observer, 2 February 2003
“Billionaire linked to Labour arrested in London” Guardian, 2 April 2003
“So, Norman, any regrets this time?” Observer, 6 April 2003
“Tycoon in quiz over ties to Labour” Observer, 6 April 2003
“Politics of sleaze” Observer, 16 November 2003
“MP questions Iraq role of Briton tainted over Elf” (this has also been titled “British fraudster to profit from Iraq contract”) Observer, 16 November 2003
Auchi’s Middle East Online April 23 celebrates the removal of the six articles with a photo of a sphinx-like Auchi. The caption: “Tracking even the search engines.”
In addition to the UK Guardian, the MEO article speaks proudly of articles forced off the Internet sites of the UK Sunday Times, the Financial Times, and Italian business weekly Il Mondo.
Crows Carter-Ruck attorney Alasdair Pepper: “Another publisher is now shortly to be sued over false material it is publishing on the internet, having failed to heed a warning letter. A fulsome apology, injunction and substantial damages will be sought against it.”
Carter-Ruck’s website touts the UK Daily Mail’s description of the firm as “London’s best known and most feared libel lawyers.” But dead men cannot sue.
On December 23, 2003 former Carter-Ruck partner
“The libel lawyer Peter Carter-Ruck, who died on Friday, had a chilling effect on the media. He was a chancer, out for the maximum fee. And he did for freedom of speech what the Boston Strangler did for door-to-door salesmen… He established the idea that libel law was complicated and merited very high fees. In the process he became very rich. ‘I like to bill the clients as the tears are flowing,’ he told me.”
In another article now missing from its original website, Jack Kelly of RealClearPolitics.com wrote:
“‘The name Nadhmi Auchi was just another name for Saddam’s intelligence service, or so we thought,’ said Nibras Kazimi, a former Iraqi dissident who is now a visiting scholar at the Hudson Institute in Washington D.C.
“‘The name Nadhmi Auchi was just another name for Saddam’s intelligence service, or so we thought,’ said Nibras Kazimi, a former Iraqi dissident who is now a visiting scholar at the Hudson Institute in Washington D.C.
“Mr. Auchi is a business partner of Syrian-born businessman Antoin ‘Tony’ Rezko, who has supported Mr. Obama financially since his first run for the Illinois state senate in 1996.”
Additional Targets
Journalists are not the only targets. The former Wikipedia entry for Auchi’s GMH remains available on Answers.com. It reads in part: “In 1996, according to European news accounts, Belgium’s ambassador to Luxembourg charged that Banque Continentale du Luxembourg, a bank that Nadhmi Auchi and Paribas jointly controlled until 1994, had handled personal accounts for former dictator of Iraq Saddam Hussein.”
Banque Continentale denies the charges.
But the original GMH Wikipedia article has been taken down, replaced by an entry flagged as being “written like an advertisement” which mentions none of the controversy swirling around GMH.
Lead is joined by silver. In the scrubbed article, the Guardian’s Cohen wrote: “(Auchi) has been able to collect British politicians the way other people collect stamps.”
The London Times, which has held out against most of the Carter-Ruck litigation threats writes:
“On the 20th anniversary of his business in 1999, Mr. Auchi received a greeting card signed by 130 politicians, including Tony Blair, William Hague and Charles Kennedy, who were then leaders of their respective parties.”
“On the 20th anniversary of his business in 1999, Mr. Auchi received a greeting card signed by 130 politicians, including Tony Blair, William Hague and Charles Kennedy, who were then leaders of their respective parties.”
But even this Times article has been tagged. At the end is a disclaimer added after the original publication:
Note: we wish to make it clear that, in the original piece “Obama bagman is sent to jail over $3.5m payment by British tycoon” (Feb. 1), we did not intend to suggest that there was any connection between the $3.5m loan from Mr. Auchi to Mr. Rezko and any approaches Mr. Rezko may have made to Illinois State Officials. We apologise to Mr Auchi for any misunderstanding.”
Note: we wish to make it clear that, in the original piece “Obama bagman is sent to jail over $3.5m payment by British tycoon” (Feb. 1), we did not intend to suggest that there was any connection between the $3.5m loan from Mr. Auchi to Mr. Rezko and any approaches Mr. Rezko may have made to Illinois State Officials. We apologise to Mr Auchi for any misunderstanding.”
Sanitizing the Record
Web scrubbing begins at home—in this case with Middle East Online, owned by GMH. The Real Barack Obama documents January 2008 deletions taken down from Auchi’s website as Rezko prepared to go to trial.
Also scrubbed: the website of the press secretary of Rep. John Knollenberg (R-MI) and even an ABC news article. The deletions appear aimed at obliterating all reference to Auchi’s April, 2004 visit to Michigan and Illinois.
Auchi is photographed meeting with Rezko, Gov. Rod Blagojevich (D-Il), and President of the Illinois Senate Emil Jones during the visit. Jones and Rezko were both key early-money Obama backers.
The Chicago Tribune and numerous other reports place Obama at the dinner at the Four Seasons hotel with Auchi, Blagojevich, Rezko and others. Court testimony by Stuart Levine in the Rezko trial places Obama at an April 3, 2004 party held in Auchi’s honor at Rezko’s house.
In spite of his British connections and an earlier 2004 U.S. visit, Auchi was denied entry into the U.S. in 2005. It is believed that he was attempting in 2005 to win a U.S. visa with the help of Rezko and several as-yet-unnamed Illinois political figures.
Among Auchi’s many international awards is a 2005 election as an “Honorary Member in the International College of Surgeons in Chicago, Illinois.” Obama has denied trying to help Auchi.
Media Protection
In the U.S. efforts are underway to prevent foreign court libel judgments from infringing on the First Amendment guarantees of press freedom. On May 7, Senator Joseph Lieberman (I-CT) was among those announcing introduction of the Free Speech Protection Act which has been referred to the Senate Judiciary Committee for consideration.
He explained: “The United Kingdom has become a popular venue for defamation plaintiffs from around the world, because under English law it is not necessary for a libel plaintiff to prove falsity or actual malice as is required in the United States.”
Lynne Bradley, Director of American Library Association’s Office of Government Relations, explains the ALA’s July 31 decision to support the bill: “ALA is concerned that foreign libel lawsuits threaten U.S. authors and publishers and our freedoms of speech and the press.
Through its chilling effect, such ‘venue shopping’ also denies the American people the right to read and to access information―another inherent First Amendment right essential to our democratic form of government.” The ALA has endorsed the bill, which is cosponsored by Senators Arlen Specter (R-PA) and Charles Schumer (D-NY).
Auchi is not the only one taking advantage. In the UK, several books have been pulped and removed from libraries and booksellers after threats of expensive, drawn out litigation by wealthy Arabs and others.
While Islamist illegal combatants captured in combat on foreign soil and held at Guantanamo are moving closer to attaining the legal rights of U.S. citizens, American authors investigating and writing about subjects related to Islamist terror and Mideast corruption have been sued under a foreign legal system with inferior free speech protections and subjected to six-figure judgments entered in foreign courts.
Carter-Ruck’s efforts on behalf of Auchi go beyond major newspapers. Several websites carrying articles by RezkoWatch writer and progressive investigative journalist Evelyn Pringle were threatened with UK-based lawsuits.
This was the second demand letter directed at RezkoWatch; the first arrived February 9. In response, RezkoWatch editors scrubbed any reference to Auchi as “corrupt” from their website except when quoted from an external source.
In its posted response to Pepper, RezkoWatch indicates it also “archived” numerous articles pending verification of their contents.
In a June 29, 2008 AmericanThinker.com article: “Free Speech, the Obama Campaign, and the Washington Post”, this author wrote: “A Presidential candidate must be prepared to face extraordinary levels of scrutiny.
If Obama and his supporters think they can silence questions about his background, his leftist terror-bomber backers, his ‘God damn America’ pastor, his cocaine use, his financial dealings with indicted Syrian-born businessman Tony Rezko, or with Saddam Hussein crony and oil-for-food banker Nadhmi Auchi, they are mistaken.”
Intimidation
Apparently I was mistaken. After American Thinker received a letter from Carter-Ruck, the sentence was chopped off after the word “Rezko.” Many website operators simply do not have the legal or financial resources necessary to face off with Carter-Ruck.
Larry Johnson of the No Quarter Blog received and posted online a February 18 demand letter from Carter-Ruck which claims Auchi “was not involved in any of (Saddam Hussein’s) operations.” Carter-Ruck even demands removal of material in the comments section below Johnson’s blog postings.
Similar claims, as well as misspellings, are contained in other of Pepper’s letters seen by this writer—perhaps indicating that the Auchi threat letter machine is nearing its operational limits and might fail if Internet users revolt and begin randomly posting deleted Auchi material all over the Internet in an act of cyber-civil-disobedience.
Senator Lieberman’s Free Speech Protection Act is modeled on “Rachel’s Law” signed April 30, 2008 by New York Governor David Paterson.
Rachel’s Law had passed both houses of the New York state legislature unanimously March 31 after being introduced with bi-partisan support. “Rachel” is Rachel Ehrenfeld, an investigative journalist and author of Funding Evil: How Terrorism is Financed and How to Stop It.
Ehrenfeld’s 2003 book, published in the U.S., pointed to Saudi multi-millionaire Khalid Salim Bin Mahfouz as a funding source for al-Qaeda prior to 9-11. Mahfouz sued.
He is Saudi; the book, its author and publisher are American; but rather than coming to a U.S. court, Mahfouz selected English jurisdiction in a typical case of “libel tourism.” Ehrenfeld did not answer the English suit and instead countersued in U.S. federal court.
Legal assaults from Middle Eastern sources are becoming so widespread that the Middle East Forum has founded The Legal Project to raise funds and recruit some of the nation’s finest attorneys willing to stand up pro-bono for free speech and defend writers against lawsuits and intimidation.
Six weeks after Governor Paterson signed Rachel’s Law, the New York Times published “Out of Step with Allies, U.S Defends Freedom to Offend in Speech” painting U.S. free speech as “out of step” with almost every other country because so-called hate speech is not banned.
The Times’ primary example―a trial in British Colombia, where the Canadian Islamic Conference accuses MacLean’s magazine of violating Canadian ‘hate speech’ laws for publishing an excerpt from Mark Steyn’s book America Alone: The End of the World as We Know it.
According to the Times, the Muslims demand, “the magazine should be forbidden from saying similar things, forced to publish a rebuttal and made to compensate Muslims for injuring their ‘dignity, feelings and self-respect.’” Canada’s laws are similar to those in Britain and the many other countries with which the U.S. is “out of step.”
As negative comment raged across the Internet, the Times scrubbed its own article, removing “Out of step with allies” from the title.
Also quoted in the Times, Jeremy Waldron, a New York University law professor, wrote in the New York Review of Books May 29: “It is not clear to me that the Europeans are mistaken when they say that a liberal democracy must take affirmative responsibility for protecting the atmosphere of mutual respect against certain forms of vicious attack.”
Silent Treatment
U.S. media outlets are historically strong defenders of press freedoms. But there has been near-total silence about the UK-based legal threats to public discussion of the Rezko affair. While Auchi’s interference may explain part of the media’s lack of interest, the attitude of the New York Times and New York Review of Books goes a long way towards explaining the rest.
If elected President, Obama will be required to swear to “preserve, protect and defend the Constitution of the United States.” Will Senator Obama now join in co-sponsoring S-2977, the Free Speech Protection Act of 2008, and call upon his fellow Democrats to bring the bill to the floor of the Senate for a vote?
If not will Obama explain why the Free Speech Protection Act is not necessary to “preserve, protect and defend the Constitution?”
Will reporters covering the campaign ask Obama whether, if elected, he would approve a request for U.S. residency from Auchi?
Are the media now cooperating in their own silencing? The attitude of the New York Times does not bode well.
Andrew Walden is Editor of the Hawaii Free Press in Hilo, Hawaii.
Andrew Walden is Editor of the Hawaii Free Press in Hilo, Hawaii.
Sunday, August 24, 2008
CATHOLICS REJECT FALSE CATHOLIC BIDEN
The Roman Catholic group, Fidelis, says Barack Obama's selection of pro-abortion Catholic Joe Biden to be his V.P. running mate "is a slap in the face to Catholic voters" and poses a major challenge for American Catholics.
In a press release sent out overnight, Fidelis president, Brian Burch, declared that Barack Obama has "re-opened a wound among American Catholics" by picking a pro-abortion Catholic politician like Joe Biden.
According to Burch, the American Catholic bishops have made it clear that Catholic political leaders must defend the dignity of every human person, including the unborn.
" Sadly, Joe Biden's tenure in the United States Senate has been marked by steadfast support for legal abortion" he added.
During the recent Democratic primary campaign Biden said: I am a long-standing supporter of Roe v Wade and a woman's right to choose."
Burch notes that in 2004, John Kerry's support of abortion sparked a nationwide controversey over whether Catholics who support legal abortion can receive communion.
Burch says "now, everywhere Biden campaigns, we'll have this question of whether a pro-abortion Catholic can receive Communion."
"Senator Biden is an unrepentant supporter of abortion in direct opposition to the church he claims as his own. Selecting a pro-abortion Catholic is a slap in the face to Catholic voters," said Burch.
According to Burch, "The American bishops have instructed Catholic voters to consider many issues, but have characterized the defense of human life as foundational and have explained that the issue has a special claim on the conscience of the Catholic voter.
This means that a political candidate like Biden, because of his strong support for abortion rights, forfeits any claim for support despite his views on other issues like health care and the economy."
In a press release sent out overnight, Fidelis president, Brian Burch, declared that Barack Obama has "re-opened a wound among American Catholics" by picking a pro-abortion Catholic politician like Joe Biden.
According to Burch, the American Catholic bishops have made it clear that Catholic political leaders must defend the dignity of every human person, including the unborn.
" Sadly, Joe Biden's tenure in the United States Senate has been marked by steadfast support for legal abortion" he added.
During the recent Democratic primary campaign Biden said: I am a long-standing supporter of Roe v Wade and a woman's right to choose."
Burch notes that in 2004, John Kerry's support of abortion sparked a nationwide controversey over whether Catholics who support legal abortion can receive communion.
Burch says "now, everywhere Biden campaigns, we'll have this question of whether a pro-abortion Catholic can receive Communion."
"Senator Biden is an unrepentant supporter of abortion in direct opposition to the church he claims as his own. Selecting a pro-abortion Catholic is a slap in the face to Catholic voters," said Burch.
According to Burch, "The American bishops have instructed Catholic voters to consider many issues, but have characterized the defense of human life as foundational and have explained that the issue has a special claim on the conscience of the Catholic voter.
This means that a political candidate like Biden, because of his strong support for abortion rights, forfeits any claim for support despite his views on other issues like health care and the economy."
TERRORISM LITERATURE REPORT
Terrorism Literature Report
(TLR) No. 68
22 August 2008
Contents
Article 1 “Foreign Fighters: How Are They Being Recruited? Two Imperfect Recruitment Models,” by Clinton Watts, Small Wars Journal Blog, 22 June 2008. Currently, debate focuses on two models of foreign fighter recruitment and transit to theaters of open conflict.
The first model is one of top-down recruitment where Al-Qaeda (AQ) recruits young men and coordinates their travel to an operational theater.
The second model suggests the opposite where young men recruit themselves and find their way to open theaters of conflict joining a global jihadi movement inspired but not necessarily led by AQ.
In fact, neither of these models adequately illustrates modern jihadi recruitment patterns in the Middle East and North Africa.
First, the models assign too much importance to the Internet in the Middle East and North Africa; second, Al-Qaeda globally or locally does not have sufficient operational space, communication, and logistical support to execute large-scale, top-down recruitment; and third, both of these models ignore the key role played by veteran foreign fighters, who are extremely effective radicalizers, recruiters, and coordinators.
Article 2 “Deconstructing Political Orthodoxies on Insurgent and Terrorist Sanctuaries,” by Michael A. Innes, Studies in Conflict and Terrorism, Vol. 31, No. 3, March 2008. Notions of sanctuary are ubiquitous, embedded in legislative frameworks, political and religious conventions, cultures of hospitality, and codes of honor and revenge the world over.
Terrorists operate across a broad spectrum of political, insurgent, and criminal realms. Their sanctuaries go to the heart of debates on national security because of the questions they raise about the interface between states and individuals, and the complex moral and practical outcomes of counterterrorist operations.
To fully understand sanctuaries, however, is to uncover the problems and pitfalls of waging war on locations—exposing the secret lives of multiple hidden worlds. This murky underground is far more complex and varied than the conventional wisdom suggests.
Sanctuary, in the broadest send of the term, might be just as usefully defined according to what terrorists are thinking, and what they are trying to protect, accomplish, or hide from. Critics of the War on Terror have quite rightly pointed to the futility of essentially waging war on a tactic. Waging war on locations is just as problematic.
Article 3 “Bojinka II: The Transatlantic Liquid Bomb Plot,” NEFA Foundation (Nine/Eleven Finding Answers), April 2008. This item, 23 pages-long and well-documented, is Report No. 15 in the NEFA series, “Target: America.” Sources include various open source media documents and statements from multiple international government officials and agencies.
The report’s sections include: the plotters: England and Pakistan; operational details of the plot; the number of flights, carriers, and routes targeted; planned detonation location—over U.S. cities?; planned timing of the attacks; the projected impact of the attacks; bomb-making efforts; recording martyrdom videos—and authoring a last will; additional material seized by investigators; the plot’s links to Al-Qaeda; Rashid Rauf’s alleged links to Al-Qaeda and Pakistani extremist groups; and the Pakistan connection.
Article 4 “Islam and War: A Review Essay,” by John C. Zimmerman, Terrorism and Political Violence, Vol. 20, No. 3, July 2008. Five books are treated in this book review essay including:
(1) Raymond Ibrahim, editor, The Al-Qaeda Reader;
(2) Shmuel Bar, Warrant for Terror: The Fatwas of Radical Islam and the Duty to Jihad;
(3) John Kelsay, Arguing the Just War in Islam;
(4) David Bukay, From Muhammad to Bin Laden:
Religious and Ideological Sources of the Homicide Bombers Phenomenon; and (5) T. P. Schwartz-Barcott, War, Terror, and Peace in the Quran and in Islam:
Insights for Military and Government Leaders.
The TLR has been published at least monthly since October 2003 by Interaction Systems Incorporated (isincreports@mindspring.com). TLR issues are intended for non-profit research and educational use only. Quoted material is subject to the copyright protections associated with the original sources.
Top of TLR Cover Page
Articles
Article 1 Return to TLR Cover Page
1. “Foreign Fighters: How Are They Being Recruited? Two Imperfect Recruitment Models,” by Clinton Watts, Small Wars Journal Blog, 22 June 2008.
[KBTZRecruiting, KBTZOrigins, KBTCInternet, KBTGStrategies, KBTWPublicDiplomacy] Clinton Watts previously served as a U.S. Army infantry officer, an FBI special agent, and executive officer of the Combating Terrorism Center at West Point (CTC). He currently serves as the director for international and national programs at PJ Sage, Inc.
As noted at http://www.jihadica.com/new-iraq-foreign-fighter-study, Watts has studied and reported on a collection of foreign fighter data from Sinjar, Iraq.
From http://www.smallwarsjournal.com/blog/2008/06/foreign-fighters-how-are-they we quote:
Currently, debate focuses on two models of foreign fighter recruitment and transit to theaters of open conflict.
The first model is one of top-down recruitment where Al-Qaeda (AQ) recruits young men and coordinates their travel to an operational theater.
The second model suggests the opposite where young men recruit themselves and find their way to open theaters of conflict joining a global jihadi movement inspired but not necessarily led by AQ.
Both models assign a role to the Internet in this process. The first model (top-down) holds that militant propaganda on the Internet makes young men susceptible to recruiters. The second model (bottom-up) holds that the Internet not only radicalizes young men, but also helps them find a way to travel to open theaters of conflict.
The Sinjar records illustrate that neither of these models adequately illustrates modern jihadi recruitment patterns in the Middle East and North Africa.
First, the models assign too much importance to the Internet in the Middle East and North Africa, where it plays a limited role in radicalizing, recruiting, and coordinating young men.
Second, Sinjar data does not portray Al-Qaeda globally or locally to have sufficient operational space, communication, and logistical support to execute large-scale, top-down recruitment.
Third, both of these models ignore the key role played by veteran foreign fighters, who are extremely effective radicalizers, recruiters, and coordinators. . . .
What to think of our two recruitment models
Certainly, official AQ members at times directly initiate recruitment in North African and Middle Eastern countries. Occasionally, individuals self-radicalize and independently seek out the greater jihad, possibly using the Internet for ideological indoctrination and communication with facilitators.
However, both of these scenarios represent only a portion of foreign fighter recruitment. Most North African and Middle Eastern foreign fighters are instead recruited through social, family, and religious networks empowered by former foreign fighters who catalyze the radicalization process.
These local networks are efficient, built for the community, and adaptable to local conditions. Such networks are difficult to create in either a hierarchical AQ Central (top-down) or a self-selecting (bottom-up) system.
An alternative foreign fighter recruitment model might reflect all three patterns described above. My hypothesis for future research estimates that global foreign fighter flow consists of roughly the following:
Self-selecting (bottom-up) recruitment accounts for ten to 15 percent of global foreign fighter recruitment. These self-recruits consist largely of second and third generation Muslims and converts to jihadi doctrine based in Western countries, the majority of which reside in the European Union.
Their increased Internet access and propensity for militancy help radicalize them locally before moving through select intermediaries to more formal networks. These individuals are inexperienced, untrained, and often a liability to the larger AQ movement as their conduct may stray from AQ’s global message, and their operational and security mishaps endanger the group.
However, their access to Western targets and their propaganda value remain a coveted prize for AQ and a worthwhile risk.
AQ hierarchical (top-down) recruitment accounts for an additional ten to 15 percent of global foreign fighter recruitment. AQ, under intense pressure from Western military and intelligence, expends effort to specifically recruit individuals that maintain valuable skills in weaponry, media, operational planning, finance, and logistics.
These recruits pose the greatest threat globally as their knowledge, skills, and experience create hallmark AQ attacks and maintain organizational coherence. While self-recruits are dangerous due to their access, these direct recruits are dangerous due to their ability.
Former foreign fighters embedded in family, religious, and social networks in flashpoint North African and Middle Eastern cities produce between 60 and 80 percent of global foreign fighter recruitment.
Jihadi veterans and their networks are the center of gravity not only for Al-Qaeda but also for decades of jihadi militancy. These communities are motivated not only by militant ideology but by their perceived oppression from the West economically and politically, frustration over the Palestinian-Israeli conflict, and the influence of Western values on their culture.
High foreign fighter-producing communities sustained the Afghan jihad during the 1980s, provide for current campaigns in Iraq and Afghanistan, and will be the thread for future militant efforts at the close of current conflicts.
Radicalization—Fear not what you can see, but what you cannot see
Western fixation with AQ’s propaganda has resulted in over-focus on countering media outlets that likely have limited and at best a secondary recruiting impact in high foreign fighter-producing cities and countries.
While AQ mass media propaganda is an important factor in the war of ideas, it should be addressed more in Western counterterrorism efforts in Western countries where socially isolated second and third generation Muslims and Western converts have limited direct access to militant ideologies, limited access to veteran foreign fighters, increased access to the Internet, and a propensity to access militant Websites.
The two non-Western exceptions to this might be Saudi Arabia and Morocco, which appear to have sufficient access and desire to utilize militant Websites. However, the plethora of former foreign fighters in Saudi Arabia and Morocco is far more likely the radicalization culprit with the Internet acting as a distant second factor.
The West should fear instead what it cannot see on the Internet: the day-to-day interactions and subsequent radicalization occurring when veteran foreign fighters encounter young recruits in living rooms, ideological centers, schools, workplaces, and neighborhoods in flashpoint cities. . . . [City] and nodal strategies are far more likely to disrupt the radicalization process than regional and country approaches.
Within these city and nodal strategies, counterterrorism efforts should focus on the social and religious networks and look to interrupt or fragment face-to-face recruitment.
Information operations and public diplomacy efforts might identify local leaders that counter the jihadi narrative and subtly amplify their message through appropriate print and radio communications.
Counter narratives should diminish the image of veteran fighters, casting them as a stain on local communities rather than a badge of honor. Accounts of foreign fighter atrocities and Muslim suffering from these atrocities must be injected into local dialogue in flashpoint cities.
Currently, flashpoint cities hear the glory of jihad from returning foreign fighters, the aggression of Western forces from local media outlets, and little of the suffering of local Muslims in Iraq and Afghanistan at the hands of foreign fighters.
One information operations strategy might create coverage of the foreign fighter equivalent of the My Lai massacre from Vietnam. North African and Middle Eastern journalists could follow the path of their local foreign fighters and report on Iraqi and Afghan suffering due to their local recruits. Such methods would ideally reduce the perceived value locally of becoming a foreign fighter globally.
Worry about the flow of fighters into Iraq—Worry more about the flow of fighters out of Iraq
While the distribution and number of foreign fighters is alarming, foreign fighters leaving the battlefields in Iraq and Afghanistan are of greater concern. Looking at the hypothetical global foreign fighter flow outlined above, Western military and intelligence efforts continue to dismantle Al-Qaeda in South Asia and Iraq, thwarting top-down recruitment.
Western law enforcement and immigration measures continue to improve identifying emerging cells before becoming operational. However, former fighters from flashpoint cities, the majority of Sinjar fighters, pose a tremendous challenge as national sovereignty prevents Western military, intelligence, and law enforcement assets from effectively penetrating local networks. Instead, the West must rely on North African and Middle Eastern governments to execute counter-radicalization efforts.
These efforts vary in effectiveness and potentially exacerbate local recruitment.
Western counterterrorism elements should make foreign fighter tracking as seamless as foreign fighter recruitment. Integration and analysis of immigration and travel patterns between flashpoint cities, Western countries, Iraq, and Afghanistan must be combined with military efforts overseas and law enforcement efforts locally.
Western countries might tie counterterrorism funding to participation in an international foreign fighter-tracking program, which Western intelligence and law enforcement can utilize to track migration patterns from flashpoint cities.
While executing this will require a delicate touch, it will focus on the real counterterrorism goal, which is preventing trained foreign fighters from creating more attacks globally and recruits locally. Western analysts, from a national to a local level, should establish intelligence tripwires for law enforcement encountering individuals from flashpoint cities.
Reducing global foreign fighter recruitment requires synchronization between the military eliminating formal AQ, diplomatic, surrogate, and information campaigns penetrating foreign fighter networks in flashpoint cities, law enforcement disrupting cells domestically, and intelligence organizations coordinating and synthesizing across all three battlefields.
The foregoing is Article No. 1 (TL068A01) in the Terrorism Literature Report (TLR), No. 68, 22 August 2008, prepared by Interaction Systems Incorporated (isincreports@mindspring.com).
Top of Article
Article 2 Return to TLR Cover Page
2. “Deconstructing Political Orthodoxies on Insurgent and Terrorist Sanctuaries,” by Michael A. Innes, Studies in Conflict and Terrorism, Vol. 31, No. 3, March 2008. [KBTITheory, KBTQNetwork, KBTGStrategies, KBTZGeneral]. Michael A. Innes is affiliated with the School of Politics and International Studies, University of Leeds, Leeds, United Kingdom. We quote from this article from http://www.informaworld.com/smpp/407816798-81458445/content~content=a790743753~db=all~order=page:
. . . There are as many ways, places, and reasons to hide as there are approaches to understanding and locating the hidden. Notions of sanctuary are ubiquitous, embedded in legislative frameworks, political and religious conventions, cultures of hospitality, and codes of honor and revenge the world over. Their varied and subtle facets have traditionally been depicted in ways that relate to individual human beings, but they are also more generally places and spaces apart, where real and perceived challenges to established order can thrive and persist. . . .
. . . In the post-9/11 world, Afghanistan was seen to be the archetypal terrorist base of operations, linking official sponsorship of terrorism, failed state vulnerability to terrorist exploitation, and the absence of international legitimacy that underscores both. Terrorist sanctuaries have since captured the collective attention. The sad truth, evidenced in the post-Cold War record of so-called intelligence failures, is that one knows precious little about the terrorist underground beyond what its denizens choose to reveal.
[Sanctuaries, murky underground far more complex, varied than commonly believed]
One’s perceptions and understanding of terrorism, insurgency, and war have been in a continual process of negotiation with events and trends in Afghanistan and Iraq, in Istanbul, London, and Madrid. Military and counterterrorist campaigns have raised important questions on how one deal’s with security both at home and elsewhere in the world. Terrorist sanctuaries have been at the center of such discussions, and they remain important for several reasons.
Terrorists operate across a broad spectrum of political, insurgent, and criminal realms. Their sanctuaries go to the heart of debates on national security because of the questions they raise about the interface between states and individuals, and the complex moral and practical outcomes of counterterrorist operations. Critics of the War on Terror have pointed to the futility of waging war on a tactic. Its emphasis on denying “sanctuary” and “safe havens” to terrorists, rooted primarily in a thin layer of traditional counterinsurgency theory and poorly conceptualized policy statements, has placed a premium on physical territory, from mountain caves and frontier hideouts to the bordered world of modern states.
To fully understand sanctuaries, however, is to uncover the problems and pitfalls of waging war on locations—exposing the secret lives of multiple hidden worlds, filled with extremists, criminals, soldiers, and spies, with the pious and the profane, with dangers that lie below the surface and in the margins. This murky underground is far more complex and varied than the conventional wisdom suggests.
Terrorists have hidden in plain sight in modern metropolises, used advanced communications technology to build virtual refuges, crafted militant enclaves out of the disarray of failed states, flocked to distinctly unsafe insurgent battlespaces, and generally challenged the protective limits of law, citizenship, and state. . . .
[Conventional wisdom on terrorist sanctuaries incomplete, awkward, often conflicting]
. . . The conventional wisdom [about terrorist sanctuaries] can be summed up as follows:
· Terrorist sanctuaries are embedded within the structures of states, whether those states are strong or deficient.
· They are geographical phenomena, linked to the physical territories of states, often behind poorly secured political and natural borders.
· They are primarily rural phenomena, concentrated in the countryside or on the rugged frontiers between states.
· They are both isolated and accessible, with low population density.
· They provide terrorists the time, space, and resources to gather, organize, learn, rehearse, test and implement plans, weapons, skills, beliefs, and so on.
· They are bases for numerous types of activity, including leadership, financing, command, control, communications, sponsorship, support, propaganda, and recruiting.
Taken in the aggregate, these six pieces of conventional wisdom offer a conceptual point of departure that is incomplete, awkward, sometimes misleading, and often conflicting. . . .
[Policy formulations to deal with terrorist Internet use clearly inadequate for problem set]
. . . Whether terrorists exist as atomized cells along dispersed transnational networks, gather in numbers for training or planning purposes, or coalesce as semi-cohesive squads for insurgent activity in Afghanistan, Chechnya, and Iraq, understanding their clandestine refuges will require a much wider array of considerations than policy perspectives have provided thus far. [Former Deputy Secretary of Defense] Paul Wolfowitz’s four-part typology of democratic, territorial, ideological, and virtual sanctuaries is a case in point.
Consider the geographic emphasis of territory, implying terrain within a well-defined system of political boundaries. The obvious elision is that solitary terrorists need neither vast expanses of countryside nor bordered areas of sovereign territory in which to operate, but rather physical space needed for their personal survival and subsistence. Collapsing or expanding it to fit more or less terrorists is an issue of scale, but does not change the basic corporeal fact of their existence. They occupy the kind of spaces that do not exist in the absence of states, but instead are enabled by channels and conduits that pass between, over and through them—exploitable sites and pathways, in other words, that defy the power and reach of government.
The sovereignty of such space is another debatable quality, encompassing the political entitlements of legitimate states, as well as the human rights of individuals within them. Such sites might be conceived of at two basic levels: macro-level sanctuaries, with defined political or natural borders, including non-state, sub-state, multi-state, and international areas; and micro-level sanctuaries, that operate irrespective of the role, participation, or presence of states. The political geography of terrorist sanctuaries, with its dynamic “small world topology” of place, space, scale, and linkages between them, addresses this multidimensionality and the shearing force between dispersed social networks and the territorial states they overlay.
Consider also that government efforts to qualify public understanding of ideology in this context often come across as thinly veiled cultural critiques. Setting this aside, ideology is constrained in its focus on revolutionary belief-sets or worldviews that can be real or perceived threats to the status quo. The issue is important, but it does not address the range of terrorist preferences or mentalités: the pragmatic needs of terrorists or their movements, the psychological spaces that captured and underground combatants make for themselves, the cultural masks and inhibitors that may guide their and their leaders’ selection of particular sites and forms of refuge, or the measures terrorists take to compartment their own operational and information security.
For jihadi terrorists, for example, martyrdom may ensure the path to heaven, but social welfare and support to the families of suicide attackers arguably offer relief or refuge from economic distress—pointing to what may be poorly understood incentives for terrorist activity. Prisons are another physical location that can offer psychological and intellectual haven for terrorists. Incarceration represents denial of individual freedom, but provides captive audiences in what all too often become breeding grounds for various forms of radicalization. In this context, “ideology” is inadequate to the complexities of terrorist intent, motive, and psychology, and neglects the broader role of incentives, rewards, and context in the calculus of terrorist activity.
Finally, virtuality is a key element of contemporary terrorist threats, facilitating both domestic and transnational terrorism through access to digital and Internet-based channels for command, control, communications, and intelligence (in military terms, “C3I”).
But a policy focus that suggests virtual sanctuaries are little more than Internet-based communications platforms, also potentially exaggerates the disconnect—paradoxically—between the physical spaces occupied by the Internet’s terrorist users, and the informational requirements that guide, inform, and inspire their exploitation of various means of communication—electronic or otherwise. It also minimizes an element of terrorist virtuality directly related to its informational dimensions.
Policymakers have referred repeatedly to terrorist use of the Internet for online recruitment, training, and so on, and called the process “virtual” or the place “cyber” (or vice versa). But virtuality, meaning a perceived or imagined sense of things, is also the basic psychological factor that separates terrorism from other forms of political violence. The fear of horrible death or injury is what makes terrorism such a potent force and what makes it as much a psychological as a physical threat to security. Multiple meanings of virtuality also indicate that this pillar of official policy formulations is clearly inadequate to the problem set.
[Conclusion]
Ultimately, terrorist preferences and requirements governing the role of sanctity, safety, and secrecy are much more relevant than artificial—and hastily constructed—political confections put together by speech writers working under undoubtedly extreme time pressures. Taking into account political objectives and motives, such as degrees of intended subversion, could help establish a more accurate and clearly defined understanding of clandestine and fugitive actors and their refuges.
All of which brings one back to the logic of separating sanctuary from various other aspects of terrorist activity. The conventional wisdom clearly differentiates sanctuary from sponsorship, support, leadership, finance, command, control, communications, and so on. But it also clusters such characteristics into democratic, territorial, ideological, and virtual domains.
The first approach predicates the distinctiveness of sanctuary on its physical attributes, whereas the second identifies a crosshatch of vaguely defined categories. Such policy perspectives do not convincingly identify or reconcile the often confusing array of terrorist-related phenomena. Do they set up false distinctions between what are arguably related issues? Cracks in the system, where terrorist interests, sites, and pathways function as specialized niches of clandestine activity, certainly bear closer study.
Sanctuary, in the broadest sense of the term, might be just as usefully defined according to what terrorists are thinking, and what they are trying to protect, accomplish, or hide from. Critics of the War on Terror have quite rightly pointed to the futility of essentially waging war on a tactic. It is a philosophical turn of phrase, better suited to politicking than defining the practical conduct of war. Waging war on locations is just as problematic.
The foregoing is Article No. 2 (TL068A02) in the Terrorism Literature Report (TLR), No. 68, 22 August 2008, prepared by Interaction Systems Incorporated (isincreports@mindspring.com).
Top of Article
Article 3 Return to TLR Cover Page
3. “Bojinka II: The Transatlantic Liquid Bomb Plot,” NEFA Foundation (Nine/Eleven Finding Answers), April 2008. This item, 23 pages-long and well-documented, is Report No. 15 in the NEFA series, “Target: America.” [KBTDBojinka2, KBTSBritain, KBTSPakWT] From http://www.nefafoundation.org/miscellaneous/FeaturedDocs/Bojinka2LiquidBombs.pdf we quote:
The plotters: England and Pakistan
Following the August 2006 arrest of twenty-four British-born Muslims, the Crown Prosecution Service charged twelve individuals for their role in a conspiracy targeting transatlantic flights. Those charged with conspiracy to murder for “their intention to smuggle the component parts of improvised explosive devices onto aircraft and assemble and detonate them on board” were Ahmed Abdullah Ali, Tanvir Hussain, Brian Young (AKA Umar Islam), Arafat Waheed Khan, Assad Ali Sarwar, Adam Khatib, Ibrahim Savant, Waheed Zaman, Nabeel Hussain, Mohammed Yasar Gulzar, Mohammed Shamin Uddin, and Donald Stewart-Whyte (AKA Abdul Waheed). Further, Mohammed Usman Saddique will be tried separately for preparing acts of terrorism and possessing a “CD containing titles such as ‘Bombs and More.’” And, Cossar Ali, who is Ahmed Abdullah Ali’s wife, was charged with failing to disclose information that “might be of material assistance in preventing the commission of . . . an act of terrorism.” The first trial began in April 2008.
Concurrent with the British arrests, Pakistani authorities arrested seven individuals. Media reports have also asserted that “as many as 50 participants and accomplices were involved,” comprising three cells that “may not have been aware of the others or the extent of their assignment.” As the Wall Street Journal explains [on 11 August 2006], “members of the outer cell purchased supplies, rented apartments, and transferred money needed by members of the inner cell. . . Members of the inner cell planned the attacks and at least some were preparing to participate in the missions. Both the inner and outer cells had been actively preparing the attack for more than six months but all the members may not have known each other.”
Operational details of the plot
The day [10 August 2006] of the United Kingdom arrests, Department of Homeland Security (DHS) Secretary Michael Chertoff announced that the suspects allegedly “engaged in a plot to detonate liquid explosives on board multiple commercial aircraft departing from the United Kingdom and bound for the United States. . . . The terrorists planned to carry the components of the bombs, including liquid explosive ingredients and detonating devices disguised as beverages, electronic devices, or other common objects.” He added, “I would say . . . one of the concerns we had is the possibility of bringing on board a number of different components of a bomb, each one of which would be benign, but when mixed together would create a bomb.” Chertoff further revealed that the suicide bombings were to occur “essentially at the same time.”
Since Chertoff made those initial statements, additional information has come to light about the plotters’ intentions. Multiple press sources have reported that the conspirators planned to bring the liquid explosives onto planes in factory-sealed sports drink bottles modified with false bottoms; ABC News also reported that “the terrorists planned to dye the explosive mixture red to match the sports drink sealed in the top half of the container.” In an August 2007 interview, Michael Chertoff supplemented this data by confirming prior reports that two conspirators intended to bring their baby on board and hide explosives in the infant’s bottle. And to initiate the explosions, open sources indicate the terrorists planned on using the flash from a disposable camera.
Evaluating the plot, Chertoff remarked: “This was a very sophisticated plan and operation. This is not a circumstance where you had a handful of people sitting around coming up with dreamy ideas about terrorist plots. The conception, the large number of people involved, the sophisticated design of the devices that were being considered, and the sophisticated nature of the plan all suggests that this group that came together to conspire was very determined and very skilled and very capable . . . this was a plot that is certainly about as sophisticated as any we’ve seen in recent years. . . .” . . .
The number of flights, carriers, and routes targeted
In the two years prior to the April 2008 trial of eight conspirators, authorities refused to publicly, officially identify the exact number of flights, carriers, and routes targeted by the conspirators. . . . Reflecting the authorities’ uncertainty about the exact intentions of the plotters, August 2006 media reporting, citing anonymous officials, was highly inconsistent, of the number of targeted flights ranging widely. For example, the Wall Street Journal claimed there were six such flights, while The Times Online (London) put the number at 12.
An extraordinarily detailed 28 August 2006 New York Times article, which was based on interviews with “five senior British officials” and which was banned from publication in the United Kingdom to avoid prejudicing potential jurors, asserted that British investigators felt the “estimate of 10 planes” was “speculative and exaggerated.” DHS Secretary Michael Chertoff provided additional insight into this question in an August 2007 interview, when he discussed the consequences of the would-be bombers “bringing liquid explosives on seven or eight aircraft.”
The list of carriers to be attacked has also not been made public, though DHS official Michael P. Jackson noted that the plotters’ focus “centered upon carriers that had direct, non-stop flights between the U.K. and U.S.” And Michael Chertoff stated that the group “focused on . . . U.S.-flagged carriers,” though he provided no further information.
Despite the ambiguity in official circles, media reporting has been far more consistent on this issue, as Continental Airlines, United Airlines, and American Airlines were repeatedly cited by press sources such as the Wall Street Journal, Time, ABC News, and NBC News. Moreover, British Airways was mentioned in a number of open source reports.
Between August 2006 and April 2008, press reporting served as the sole source for information on the routes identified by the operatives. Some of the final destinations mentioned included New York, Washington, D.C., Boston, Miami, Los Angeles, and San Francisco. Then, in a surprise revelation at the start of the conspirators’ trial in April 2008, a British judge and prosecutors revealed that the bombers also planned to target Air Canada flights bound for Toronto and Montreal.
Planned detonation location—over U.S. cities?
In the immediate aftermath of the plot’s disruption, DHS Chief Intelligence Officer Charlie Allen declared, “we have no evidence there was targeting of cities. . . . This was an effort to destroy multiple aircraft in flight—not against any territory of the United States.” DHS Secretary Michael Chertoff added, “I am not aware of any indication that the intent was to make the plane into a weapon.”
However, in October 2006, Mark Mershon, Special Agent in Charge of the FBI’s New York Field Office, told a security conference, “The plan was [to] bring them down over U.S. cities, not over the ocean.” Mershon cited a recent briefing that MI5 delivered to the FBI as his source for the new information; Mershon noted that “it would make your hair stand up to be in the room to hear that presentation.”
Planned timing of the attacks
When the arrests were made on 10 August 2006, some analysts pondered whether the attacks were slated to take place on the fifth anniversary of 9/11. However, government officials have downplayed that speculation. DHS Chief Intelligence Officer Charlie Allen stated, “I am a long-standing believer that terrorist plotters or planners execute when they have all of the plot together. . . . We have no evidence this was timed to any particular holiday or special event.” DHS Secretary Michael Chertoff concurred, saying, “I can tell you our general experience, certainly when you deal with Al-Qaeda . . . is that they’re not necessarily motivated by anniversaries the way sometimes people project.”
Providing additional information on the likely timing of the attacks, Chertoff assessed, “I would say that this plot was well advanced. In other words, they had accumulated and assembled the capabilities that they needed, and they were in the final stages of planning before execution . . . this is not a case where this was just in the initial thought stage. There were very concrete steps underway to execute all elements of this plan.” Interviewed in August 2007, Chertoff supplemented this analysis by revealing, “I got a call telling me that it looked as if the focus had turned . . . [to] an attack on the United States. . . . It also became evident, within 24 hours, that the time frame within which the attack was going to take place, would not be a matter of months but a matter of weeks or even days.”
At the time of their arrests, the conspirators had already researched flight schedules on the Internet; as Kip Hawley, head of the Transportation Security Administration, commented, “They were clicking online all over the place.” The plotters were also allegedly planning to imminently carry out a dry run to ensure they could successfully smuggle bomb components on board.
Additionally, following Pakistan’s arrest of alleged cell member Rashid Rauf—which reportedly took place without British authorities being notified—a co-conspirator communicated an urgent message to the United Kingdom-based network; Franco Frattini, the European Union’s security commissioner, told the media that the British plotters “received a very short message to ‘Go now.’” (According to the New York Times, “a senior British official said the message from Pakistan was not that explicit.”)
However, there is no open source evidence that plane tickets had been bought. And, The New York Times’ lengthy account asserted that two of the individuals lacked passports, though they had requested expedited approval. The Times further reported that British authorities would have continued to monitor the conspiracy, but felt compelled to act when the plotters learned of Rauf’s arrest. The Brits were supposedly concerned that the operatives would destroy evidence, flee, or that an unknown cell would spring into action.
The projected impact of the attacks
If the planned attacks were successfully carried out, the results would have been devastating, as a number of U.S. and British officials have pointed out. When announcing the plot’s disruption, Paul Stephenson, deputy chief of the Metropolitan Police, commented, “this was a plan by terrorists to cause untold death and destruction and commit mass murder.” And British Home Secretary John Reid stated, “Had this plot been carried out, the loss of life to innocent civilians would have been on an unprecedented scale.”
Across the Atlantic Ocean, U.S. authorities echoed these stark assessments. DHS Secretary Michael Chertoff remarked, “I think that the plot, in terms of its intent, was looking at devastation on a scale that would have rivaled 9/11. . . there could have been thousands of lives lost and an enormous economic impact with devastating consequences for international air travel.” New York Congressman Peter King, Chairman of the House Homeland Security Committee, agreed that “we’re talking about thousands of people being killed.”
Bomb-making efforts
In its extensive article on the plot, the New York Times reported that in June 2005, with $260,000 in cash, one of the suspects purchased an apartment on London’s Forest Road that served as a bomb factory for the conspirators. Anonymous British officials told the Times that a number of experiments were conducted and there were likely two bomb-makers. And when MI5 agents carried out a covert search, they purportedly “discovered that the inside of batteries had been scooped out, and . . . it appeared several suspects were doing chemical experiments with a sports drink named Lucozade and syringes. . . .”
Then, again, according to the Times, when authorities raided the Forest Road apartment on 10 August 2006, “they found a plastic bin filled with liquid, batteries, nearly a dozen empty drink bottles, rubber gloves, digital scales, and a disposable camera that was leaking liquid. . . .” What’s more, Commissioner Peter Clarke, head of the Metropolitan Police Service Anti-Terrorist Branch, revealed that “since 10 August we have found bomb making equipment. There are chemicals, including hydrogen peroxide, electrical components, documents, and other items.” . . .
Some press reports have questioned whether the operatives possessed the necessary technical skills to succeed in their mission. However, tests conducted at Sandia National Laboratory confirmed that the explosives formula the suspects were utilizing was viable and capable of causing a “large explosion.” Additionally, NBC News has reported that conspirators tested the mixture in Pakistan.
Recording martyrdom videos—and authoring a last will
Shortly after the arrest of the conspirators, [the Metropolitan Police’s] Peter Clarke . . . announced: “We have . . . found a number of video recordings—these are sometimes referred to as martyrdom videos.” According to the New York Times, six suspects recorded seven videos. . . .
The New York Times asserted that one of the cell members penned a last will and testament, which was located at his brother’s home [and which was dated 24 September 2004]. . . .
Additional material seized by investigators
In a press release issued eleven days after the first arrests in England, [Peter Clarke] said:
“There have been 69 searches. These have been in houses, flats, and business premises, vehicles, and open spaces . . . we have found more than 400 computers, 200 mobile telephones, and 8,000 items of removable storage media such as memory sticks, CDs, and DVDs. So far, from the computers alone, we have removed some 6,000 gigabytes of data.”
Additionally, the New York Times reported that one suspect possessed a “diary that included a list that the police interpreted as a step-by-step plan for an attack. The items included batteries and Lucozade bottles. It also included a reminder to select a date.” When searching some of the suspects’ residences, authorities also discovered an array of jihadist material, including literature and DVDs. Some of those DVDs depicted the purported “genocide” in Palestine and Iraq. Abdullah Azzam’s “Defense of the Muslim Lands” was also reportedly seized at one location in Walthamstow.
The plot’s links to Al-Qaeda
Shortly after the plot’s disruption, U.S. officials made guarded statements about the conspiracy’s links to Al-Qaeda’s central leadership. . . . [DHS’s] Charlie Allen commented, “We’re not convinced this particular operation is connected to the Al-Qaeda chain of command.” DHS Secretary Michael Chertoff concurred, asserting that although “this operation is, in some respects, suggestive of an Al-Qaeda plot . . . we cannot yet form a definitive conclusion.”
The next day, Chertoff added, “certainly in terms of the complexity, the sophistication, the international dimension, and the number of people involved, this plot has the hallmarks of an Al-Qaeda-type plot.”
These DHS analyses were echoed by FBI Director Robert Mueller, who pointed out that the conspiracy “had the earmarks of an Al-Qaeda plot” and was “suggestive of Al-Qaeda direction and planning.” (Congressman Peter King, Chairman of the House Homeland Security Committee, issued the most definitive take, saying, “It clearly is an Al-Qaeda-type operation with links to Al-Qaeda.”)
In contrast to the general reticence of U.S. authorities to firmly tie the plan to Al-Qaeda, Pakistani officials went on the record with a different perspective. For instance, Mahmud Ali Durrani, Pakistan’s ambassador to the United States, declared, “Clear evidence leads to an Al-Qaeda connection in Afghanistan.” In August 2006, some anonymous Pakistani security sources identified now-detained Al-Qaeda official Abu Faraj al-Libi as the mastermind of the plot.
However, in 2007 and 2008 reporting, a different Al-Qaeda mastermind was identified. In September 2007, the Washington Post wrote that Abu Ubaidah al-Masri, an Egyptian serving as Al-Qaeda’s “external operations chief,” was the terror network’s “conduit to the British-Pakistani cells that carried out the 7 July 2005 public transit bombings in London as well as the failed transatlantic airliner plot in Britain in 2006.”
An extensive April 2008 Los Angeles Times article echoed this analysis, quoting an anonymous Western intelligence official who said, “The airline plot is his thing.” The article added that investigators believe al-Masri received instructions from his superiors; a senior British official stated, “We have patchy intelligence on the relationship and structure between external operations figures and [Al-Qaeda number two Ayman al-] Zawahiri and bin Laden. In the really big plots, we think they played a role.” While additional unclassified information remains limited on this topic, a substantial amount of data has come to light on key plotter Rashid Rauf and his alleged ties to Al-Qaeda. . . .
Rashid Rauf’s alleged links to Al-Qaeda and Pakistani extremist groups
After Rashid Rauf’s arrest, Aftab Ahmad Khan Sherpao, the Pakistani interior minister, labeled Rauf a “key Al-Qaeda operative.” Open source reporting has linked Rauf to a number of high-ranking terrorists. For example, NBC News reported that Rauf had contacts with Amjad Hussein Farooqi, whom Sherpao called “the chief Al-Qaeda contact in Pakistan”; Farooqi, who belonged to Laskar-i-Jhangvi and hijacked an Indian Airlines plane in December 1999, was reportedly involved in two assassination attempts on Pakistani President Pervez Musharraf, as well as the murder of Wall Street Journal reporter Daniel Pearl.
NBC further claimed that after accompanying Farooqi to Afghanistan in mid-2002, Rauf “became a regular visitor . . . traveling to various parts of the country to meet Al-Qaeda figures.” In the wake of Farooqi’s death, Rauf allegedly “established . . . direct and regular contact with Abu Faraj al-Libi. . .”, whom the U.S. government believes “was responsible for Al-Qaeda activities and logistics throughout Pakistan.”
Additionally, the Washington Post has claimed that Rauf “reported to” Abu Ubaidah al-Masri, an Egyptian serving as Al-Qaeda’s “external operations chief.” Rauf was also allegedly involved with Jaish-e-Mohammed [JeM], though there is no public evidence tying that organization to the conspiracy. Rauf reportedly became acquainted with JeM’s leadership at the Darul Uloom Madina, a hard-line madrassa founded by his father-in-law. Moreover, Rauf’s wife’s sister married Tahir Masood, the younger brother of the founder of JeM. . . .
The Pakistan connection
A Washington Post report, citing interviews with U.S. and European officials, identified Pakistan as the “hub” of the conspiracy, which “drew financial and logistical support from sponsors operating in Karachi and Lahore.” Moreover, several alleged planners supposedly traveled to Pakistan in the months before their arrest “to seek instructions and confer with unknown conspirators. . . .”
While there are claims some of the individuals attended training camps in Pakistan, with an April 2008 Los Angeles Times article placing the number of attendees at six, this allegation has not been confirmed by official, on-the-record sources. . . .
The foregoing is Article No. 3 (TL068A03) in the Terrorism Literature Report (TLR), No. 68, 22 August 2008, prepared by Interaction Systems Incorporated (isincreports@mindspring.com).
Top of Article
Article 4 Return to TLR Cover Page
4. “Islam and War: A Review Essay,” by John C. Zimmerman, Terrorism and Political Violence, Vol. 20, No. 3, July 2008. [KBTZIslam, KBTTSuicide, KBTZBibliography] Five books are treated in this book review essay by John C. Zimmerman who is affiliated with the University of Nevada Las Vegas: (1) Raymond Ibrahim, editor. The Al-Qaeda Reader. New York: Broadway Books, 2007, 318 pages. Paper $10.85. (2) Shmuel Bar. Warrant for Terror: The Fatwas of Radical Islam and the Duty to Jihad. Lanham, Maryland: Rowman and Littlefield, 2006, 134 pages. Hardcover $16.46. (3) John Kelsay. Arguing the Just War in Islam. Cambridge: Harvard University Press, 2007, 263 pages. Hardcover $16.47. (4) David Bukay. From Muhammad to Bin Laden: Religious and Ideological Sources of the Homicide Bombers Phenomenon. New Brunswick, New Jersey: Transaction Publishers, 2008, 377 pages. Hardcover $49.95. And (5) T. P. Schwartz-Barcott. War, Terror, and Peace in the Quran and in Islam: Insights for Military and Government Leaders. Carlisle, Pennsylvania: Army War College Foundation Press, 2004, 401 pages. Hardcover $26.95. We quote from this article from http://www.informaworld.com/1556-1836:
In April 2002 Al-Qaeda issued a lengthy statement giving seven justifications for targeting civilians in terrorist attacks. Two experts who analyzed the document wrote: “The sheer breadth of these conditions leaves ample theological justification for killing civilians in almost any imaginable situation.”
[Bin Laden: Muslims cannot abandon offensive jihad because it is a basic tenet of Islam]
In The Al-Qaeda Reader, Raymond Ibrahim has translated and masterfully assembled a number of key statements by Osama bin Laden and his chief lieutenant, Ayman al-Zawahiri, that shed light on their views. The centerpiece of this collection is a long exegesis by bin Laden entitled “Moderate Islam is a Prostration to the West.” Most of bin Laden’s communiques are intended to be read in the West as well as by Muslims. However, this statement was solely intended for a Muslim audience. He denounces a declaration by Saudi intellectuals that seeks coexistence with non-Muslims “as if one of the foundations of our religion is how to coexist with infidels” (p. 23).
Bin Laden rejects arguments that the West does not understand Islam. Rather, he acknowledges that there is a great deal of scholarship in the West on Islam. However, the reason for Western hostility is the Islamic doctrine of offensive jihad, which the West wants Muslims to abandon. Offensive jihad requires Muslims to attack non-Muslims and subordinate them to second class citizenship as dhimmis (non-Muslims under Muslim rule). “The West avenges itself against Islam for giving infidels but three options: Islam, jizya [a special tax imposed on non-Muslims], or the sword” (p. 42). Therefore, “Islam is spread with the sword alone, just as the Prophet [Muhammad] was sent forth with the sword” (pp. 46-47).
According to bin Laden, Muslims cannot abandon offensive jihad because it “is an established and basic tenet of this religion” (p. 32). He asks: “Why else did the sword come as an important pillar, enslaving mankind to their Master [Allah]?” (p. 33). Therefore, “Muslims, and especially the learned among them, should spread sharia [Islamic law] to the world—that and nothing else” (p. 33). Waging jihad “is our only option for glory, as has been continuously demonstrated in the [Islamic] texts” (p. 33). He states that “[b]attle, animosity, and hatred—directed from the Muslim to the infidel—is the foundation of our religion” (p. 43).
[Al-Zawahiri: Principle of equality of religions, women in democracies is “blasphemous”]
What is particularly interesting is that bin Laden does not tie his hatred of the West to colonialism, imperialism, Israel, or any of the other perceived grievances often enunciated in communiques intended for foreigners. Here, the offense is Western culture concerning issues like homosexuality and sexuality in general. Since Westerners “transgress the bounds of nature…Muslims are obligated to raid the lands of the infidels, occupy them, and exchange their systems of governance for an Islamic system…” (pp. 50-51).
Zawahiri is as unyielding as bin Laden. He warns Muslims not to befriend infidels. “The Lord Almighty has commanded us to hate the infidels and reject their love” (p. 100). He states that “[b]efriending believers [i.e., Muslims] and battling infidels are critical pillars in a Muslim’s faith” (p. 111). Islam must be made supreme in its own land and then spread “around the world” (p. 113). Democracy and Islam are incompatible because the former is a man-made religion whereas the latter recognizes that “all legislative rights belong to Allah…” (p. 130). The principle of equality in democracies is “blasphemous” because of the equality given to all religions and women. “Islam is so much richer than all these blasphemous principles” (p. 135). On the other hand, “the call to jihad and martyrdom [is] for men and women…” (p. 144).
[Islamic scholars who categorically forbid suicide attacks are few]
Fatwas have received a great deal of attention since 11 September 2001. A fatwa is a religious opinion issued by an Islamic scholar. Such scholars are called the Ulema (learned). In Warrant for Terror: The Fatwas of Radical Islam and the Duty to Jihad, Shmuel Bar masterfully examines the role of fatwas in encouraging terrorism. He makes the common observation that the attempt to reopen the gates of inquiry (known as ijtihad) that were believed to have been closed about 900 years ago, has allowed radicals to co-opt more traditional scholars. Thus, bin Laden’s mentor, the late Abduallah Azzam, who held a doctorate in Islamic studies, wrote: “A few moments spent in jihad in the path of Allah [i.e., fighting for God] is worth more than seventy years spent in praying at home” (p. 39). A Saudi sheikh ruled that 9/11 was justified because the West supports moderate Islam, which “accepts the submission to America…” (p. 53).
Even more mainstream scholars now issue hard-line interpretations. Twenty-eight scholars from Al-Azhar, the world’s leading institution for Islamic learning, issued a statement that killing Israeli civilians in Palestinian suicide attacks was “the noblest act of jihad” (p. 52). Sheikh Tahntawi, when he was head of Al Azhar, reversed his prior position and stated that “every martyrdom operation against any Israeli, including children, women, and teenagers, is a legitimate act…” (p. 63).
Mainstream scholars now issue fatwas that justify fighting American forces in Iraq. Shmuel Bar notes that “[s]cholars who categorically forbid suicide attacks are few” (p. 63). Yusuf Qaradawi, the world’s best known and most influential Islamist, supports Palestinian suicide bombers and Iraqi insurgents. He has also justified the financing of such operations from zakat, the Muslim charity collection intended for the poor.
Interestingly, no fatwas have called for the killing of bin Laden. Bar cites the complaint made in 2004 (still valid today) by the former minister of information for Kuwait that “despite the fact that bin Laden murdered thousands of innocents in the name of our religion … to this date not a single fatwa has been issued calling for the killing of bin Laden…” (p. 98). It might be added that there has been a similar failure in the Arab world to condemn bin Laden as an apostate from Islam. However, Bar does cite a fatwa from an Islamic commission in Spain that condemns bin Laden as an apostate (p. 99).
[History of sharia reasoning a history of conflict where argument often linked with violence]
Jihad is central to warfare in Islam. Literally, jihad means to struggle or strive. However, the predominant contextual meaning of this term in Islamic history is fighting in the way of God, popularly known in the West as holy war. The foundational legal texts written by Imams Malik (d. 795) and Shafi (d. 820), founders of two of the four Sunni schools of Islamic jurisprudence named after them, discuss jihad within the context of fighting.
Similarly, nearly the entire discussion on jihad in the fourteenth century Shafi manual on Islamic law discusses the term as warfare. Islam teaches that Muslims who die must await the final Day of Judgment before gaining entrance to Paradise (or Hell). However, martyrs who die in jihad are granted immediate access to Paradise and thus are able to avoid the “tortures of the grave.” All sins of the martyr are forgiven. Those admitted to Paradise will have many pleasures and advantages. A common belief espoused in some literature is that the martyr will marry 72 virgins.
In Arguing the Just War in Islam, John Kelsay, a veteran academic commentator on Islam, provides valuable insights into the juridical and ideological reasoning that allow for warfare in Islam. He warns that “[t]hose who argue that Islam has nothing to do with the attacks of 9/11 … will find no comfort here. The facts are plain. Osama bin Laden, Ayman al-Zawahiri, and other militants lay claim to some of the central practices and themes of Islamic tradition” (p. 3). However, later on, Kelsay acknowledges that in Islamic legal reasoning on warfare, “attacks are not directly and intentionally aimed at noncombatants” (p. 109).
Fighting is permitted in Islam “in order to resist injustice” (p. 24). The vast majority of Muslims see the expansion of Islam from the seventh century onwards as “an act of divine providence” which established governments that acknowledged Islam as the true religion “and replaced regimes that, by reason of their religious and moral errors, could be described as tyrannical… Islamic expansion thus involved a systematic program of regime change, in which jihad became the symbol for Muslim effort” (p. 38). War was “a means to a political end (establishing an Islamic state), which is itself a means to an overarching religious goal (calling humanity to Islam)” (p. 100). However, forced conversion of non-Muslims to Islam is strictly forbidden under Islamic law.
Kelsay delves deeply into the development of sharia reasoning which seeks “divine guidance in particular contexts [that] can yield disagreement” (p. 77). Since the process of legal reasoning is largely dependent on precedent, there is little room for independent judgment. “It is not surprising, then, that the history of sharia reasoning is a history of conflict, in which argument is often connected with violence” (p. 75).
[Later Quranic verses provided religious justification for 1,000 years of Islamic expansion]
The foundations for jihad in Islam are found in the Quran and hadiths, traditions attributed to the Prophet Muhammad. David Bukay provides a highly critical and in-depth analysis of this source material in From Muhammad to Bin Laden. Thus, “from an Islamic vantage point, all wars in Islam are religious and there is no concept of secular war…” (p. 48) He divides the Islamic views on jihad into four periods corresponding to Muhammad’s life and death.
The first period was devoted to teaching and self-restraint. Muslims were not to engage in fighting.
The second period involved defensive jihad. Here, believers could retaliate if attacked.
The third stage was offensive jihad that culminated in the conquest of Mecca by Muhammad and the consolidation of Islamic rule in Arabia.
The fourth stage was initiated by Muhammad’s followers after his death when they began their invasion and conquest of countries outside of the Arabian Peninsula. Unlike some commentators, Bukay does not see these conquests as benign.
Bukay examines the doctrine of abrogation in Islam, which holds that the earlier more moderate Quranic verses have been abrogated by the later more militant ones. The later Quranic verses have provided the religious justification for the 1,000 years of Islamic expansion from the seventh through seventeenth centuries. The militant Quranic verses, Muhammad’s conquests, and the expansion period have all profoundly affected a wide variety of militants from the Muslim Brotherhood, founded in 1928, to bin Laden and those who share his ideology.
They have also influenced others, who are considered “moderate,” like Yusuf Qaradawi, discussed earlier in this essay. They see a continuing need for Islamic expansion. Bukay does not see Western colonialism as being responsible for contemporary militancy because the 1,000-year Islamic expansion was itself a type of colonialism. He asks: if Western colonialism is responsible for contemporary Middle East violence, “why is there such a high degree of violence inside and from Saudi Arabia, a state without a colonialist past?” (p. 114).
One aspect that should be addressed is Bukay’s citing the eminent historian of Islam, Bernard Lewis, as the first to use the phrase “clash of civilizations” in a 1990 article to describe the conflict between the Islamic world and the West (p. 324). Other writers attribute the phrase to political scientist Samuel Huntington, who used it after Lewis. This is a very common error. In fact, the term was used in 1987 to denote the Islamic-Western conflict by the Islamist writer Sa’id Ayyub, a purveyor of apocalyptic visions and conspiracy theories.
[Most Islamic hadiths show Muhammad disapproved of targeting innocent civilians in war]
T. P. Schwartz-Barcott takes a less pessimistic view than Bukay in War, Terror, and Peace in the Quran and in Islam. He breaks down and analyzes many Quranic verses that deal with fighting, peace treaties, and related topics. He argues that any person who is literate in one national language “can select a few passages from the Qur’an about war and peace that suits his or her preconceptions and purposes” (p. 33).
Yet, U.S. forces in Kabul, Afghanistan, captured material “that indicates that the Qur’an was used extensively in the military training of thirty-nine [Al-Qaeda] recruits” (p. 248).
Schwartz-Barcott notes that there are Quranic verses where it is not difficult to see how some “might use these passages to plan and justify their acts of terrorism…” (p. 62). However, he also argues that some “sword verses” (i.e., Suras 2:190-193 and Sura 9:5) are either mitigated within the verses themselves or mitigated by surrounding verses. Although the Quran does not address many issues involving conduct in war, the most authoritative hadiths (traditions) of Islam show that Muhammad disapproved of targeting innocent civilians in battle.
He develops a table (Appendix A) of 214 battles involving Muslims from 633 to 1982 where he identifies when Muslims were attackers and when they were defenders. He acknowledges the unique nature of Islam’s origins in that “few if any world religions besides Islam were founded by a person [Muhammad] who led his armies in more than twenty-five battles … and ordered his armies to fight more than thirty additional battles during his lifetime” (p. 301).
The book concludes with a number of useful suggestions for policy-makers in dealing with Muslim countries. These involve promoting the protection of religious freedoms and providing humanitarian, educational, and military assistance. He demonstrates how the Quran can be cited to promote peaceful and harmonious relations (pp. 333-334).
The foregoing is Article No. 4 (TL068A04) in the Terrorism Literature Report (TLR), No. 68, 22 August 2008, prepared by Interaction Systems Incorporated (isincreports@mindspring.com).
Top of Article
Return to TLR Cover Page
(TLR) No. 68
22 August 2008
Contents
Article 1 “Foreign Fighters: How Are They Being Recruited? Two Imperfect Recruitment Models,” by Clinton Watts, Small Wars Journal Blog, 22 June 2008. Currently, debate focuses on two models of foreign fighter recruitment and transit to theaters of open conflict.
The first model is one of top-down recruitment where Al-Qaeda (AQ) recruits young men and coordinates their travel to an operational theater.
The second model suggests the opposite where young men recruit themselves and find their way to open theaters of conflict joining a global jihadi movement inspired but not necessarily led by AQ.
In fact, neither of these models adequately illustrates modern jihadi recruitment patterns in the Middle East and North Africa.
First, the models assign too much importance to the Internet in the Middle East and North Africa; second, Al-Qaeda globally or locally does not have sufficient operational space, communication, and logistical support to execute large-scale, top-down recruitment; and third, both of these models ignore the key role played by veteran foreign fighters, who are extremely effective radicalizers, recruiters, and coordinators.
Article 2 “Deconstructing Political Orthodoxies on Insurgent and Terrorist Sanctuaries,” by Michael A. Innes, Studies in Conflict and Terrorism, Vol. 31, No. 3, March 2008. Notions of sanctuary are ubiquitous, embedded in legislative frameworks, political and religious conventions, cultures of hospitality, and codes of honor and revenge the world over.
Terrorists operate across a broad spectrum of political, insurgent, and criminal realms. Their sanctuaries go to the heart of debates on national security because of the questions they raise about the interface between states and individuals, and the complex moral and practical outcomes of counterterrorist operations.
To fully understand sanctuaries, however, is to uncover the problems and pitfalls of waging war on locations—exposing the secret lives of multiple hidden worlds. This murky underground is far more complex and varied than the conventional wisdom suggests.
Sanctuary, in the broadest send of the term, might be just as usefully defined according to what terrorists are thinking, and what they are trying to protect, accomplish, or hide from. Critics of the War on Terror have quite rightly pointed to the futility of essentially waging war on a tactic. Waging war on locations is just as problematic.
Article 3 “Bojinka II: The Transatlantic Liquid Bomb Plot,” NEFA Foundation (Nine/Eleven Finding Answers), April 2008. This item, 23 pages-long and well-documented, is Report No. 15 in the NEFA series, “Target: America.” Sources include various open source media documents and statements from multiple international government officials and agencies.
The report’s sections include: the plotters: England and Pakistan; operational details of the plot; the number of flights, carriers, and routes targeted; planned detonation location—over U.S. cities?; planned timing of the attacks; the projected impact of the attacks; bomb-making efforts; recording martyrdom videos—and authoring a last will; additional material seized by investigators; the plot’s links to Al-Qaeda; Rashid Rauf’s alleged links to Al-Qaeda and Pakistani extremist groups; and the Pakistan connection.
Article 4 “Islam and War: A Review Essay,” by John C. Zimmerman, Terrorism and Political Violence, Vol. 20, No. 3, July 2008. Five books are treated in this book review essay including:
(1) Raymond Ibrahim, editor, The Al-Qaeda Reader;
(2) Shmuel Bar, Warrant for Terror: The Fatwas of Radical Islam and the Duty to Jihad;
(3) John Kelsay, Arguing the Just War in Islam;
(4) David Bukay, From Muhammad to Bin Laden:
Religious and Ideological Sources of the Homicide Bombers Phenomenon; and (5) T. P. Schwartz-Barcott, War, Terror, and Peace in the Quran and in Islam:
Insights for Military and Government Leaders.
The TLR has been published at least monthly since October 2003 by Interaction Systems Incorporated (isincreports@mindspring.com). TLR issues are intended for non-profit research and educational use only. Quoted material is subject to the copyright protections associated with the original sources.
Top of TLR Cover Page
Articles
Article 1 Return to TLR Cover Page
1. “Foreign Fighters: How Are They Being Recruited? Two Imperfect Recruitment Models,” by Clinton Watts, Small Wars Journal Blog, 22 June 2008.
[KBTZRecruiting, KBTZOrigins, KBTCInternet, KBTGStrategies, KBTWPublicDiplomacy] Clinton Watts previously served as a U.S. Army infantry officer, an FBI special agent, and executive officer of the Combating Terrorism Center at West Point (CTC). He currently serves as the director for international and national programs at PJ Sage, Inc.
As noted at http://www.jihadica.com/new-iraq-foreign-fighter-study, Watts has studied and reported on a collection of foreign fighter data from Sinjar, Iraq.
From http://www.smallwarsjournal.com/blog/2008/06/foreign-fighters-how-are-they we quote:
Currently, debate focuses on two models of foreign fighter recruitment and transit to theaters of open conflict.
The first model is one of top-down recruitment where Al-Qaeda (AQ) recruits young men and coordinates their travel to an operational theater.
The second model suggests the opposite where young men recruit themselves and find their way to open theaters of conflict joining a global jihadi movement inspired but not necessarily led by AQ.
Both models assign a role to the Internet in this process. The first model (top-down) holds that militant propaganda on the Internet makes young men susceptible to recruiters. The second model (bottom-up) holds that the Internet not only radicalizes young men, but also helps them find a way to travel to open theaters of conflict.
The Sinjar records illustrate that neither of these models adequately illustrates modern jihadi recruitment patterns in the Middle East and North Africa.
First, the models assign too much importance to the Internet in the Middle East and North Africa, where it plays a limited role in radicalizing, recruiting, and coordinating young men.
Second, Sinjar data does not portray Al-Qaeda globally or locally to have sufficient operational space, communication, and logistical support to execute large-scale, top-down recruitment.
Third, both of these models ignore the key role played by veteran foreign fighters, who are extremely effective radicalizers, recruiters, and coordinators. . . .
What to think of our two recruitment models
Certainly, official AQ members at times directly initiate recruitment in North African and Middle Eastern countries. Occasionally, individuals self-radicalize and independently seek out the greater jihad, possibly using the Internet for ideological indoctrination and communication with facilitators.
However, both of these scenarios represent only a portion of foreign fighter recruitment. Most North African and Middle Eastern foreign fighters are instead recruited through social, family, and religious networks empowered by former foreign fighters who catalyze the radicalization process.
These local networks are efficient, built for the community, and adaptable to local conditions. Such networks are difficult to create in either a hierarchical AQ Central (top-down) or a self-selecting (bottom-up) system.
An alternative foreign fighter recruitment model might reflect all three patterns described above. My hypothesis for future research estimates that global foreign fighter flow consists of roughly the following:
Self-selecting (bottom-up) recruitment accounts for ten to 15 percent of global foreign fighter recruitment. These self-recruits consist largely of second and third generation Muslims and converts to jihadi doctrine based in Western countries, the majority of which reside in the European Union.
Their increased Internet access and propensity for militancy help radicalize them locally before moving through select intermediaries to more formal networks. These individuals are inexperienced, untrained, and often a liability to the larger AQ movement as their conduct may stray from AQ’s global message, and their operational and security mishaps endanger the group.
However, their access to Western targets and their propaganda value remain a coveted prize for AQ and a worthwhile risk.
AQ hierarchical (top-down) recruitment accounts for an additional ten to 15 percent of global foreign fighter recruitment. AQ, under intense pressure from Western military and intelligence, expends effort to specifically recruit individuals that maintain valuable skills in weaponry, media, operational planning, finance, and logistics.
These recruits pose the greatest threat globally as their knowledge, skills, and experience create hallmark AQ attacks and maintain organizational coherence. While self-recruits are dangerous due to their access, these direct recruits are dangerous due to their ability.
Former foreign fighters embedded in family, religious, and social networks in flashpoint North African and Middle Eastern cities produce between 60 and 80 percent of global foreign fighter recruitment.
Jihadi veterans and their networks are the center of gravity not only for Al-Qaeda but also for decades of jihadi militancy. These communities are motivated not only by militant ideology but by their perceived oppression from the West economically and politically, frustration over the Palestinian-Israeli conflict, and the influence of Western values on their culture.
High foreign fighter-producing communities sustained the Afghan jihad during the 1980s, provide for current campaigns in Iraq and Afghanistan, and will be the thread for future militant efforts at the close of current conflicts.
Radicalization—Fear not what you can see, but what you cannot see
Western fixation with AQ’s propaganda has resulted in over-focus on countering media outlets that likely have limited and at best a secondary recruiting impact in high foreign fighter-producing cities and countries.
While AQ mass media propaganda is an important factor in the war of ideas, it should be addressed more in Western counterterrorism efforts in Western countries where socially isolated second and third generation Muslims and Western converts have limited direct access to militant ideologies, limited access to veteran foreign fighters, increased access to the Internet, and a propensity to access militant Websites.
The two non-Western exceptions to this might be Saudi Arabia and Morocco, which appear to have sufficient access and desire to utilize militant Websites. However, the plethora of former foreign fighters in Saudi Arabia and Morocco is far more likely the radicalization culprit with the Internet acting as a distant second factor.
The West should fear instead what it cannot see on the Internet: the day-to-day interactions and subsequent radicalization occurring when veteran foreign fighters encounter young recruits in living rooms, ideological centers, schools, workplaces, and neighborhoods in flashpoint cities. . . . [City] and nodal strategies are far more likely to disrupt the radicalization process than regional and country approaches.
Within these city and nodal strategies, counterterrorism efforts should focus on the social and religious networks and look to interrupt or fragment face-to-face recruitment.
Information operations and public diplomacy efforts might identify local leaders that counter the jihadi narrative and subtly amplify their message through appropriate print and radio communications.
Counter narratives should diminish the image of veteran fighters, casting them as a stain on local communities rather than a badge of honor. Accounts of foreign fighter atrocities and Muslim suffering from these atrocities must be injected into local dialogue in flashpoint cities.
Currently, flashpoint cities hear the glory of jihad from returning foreign fighters, the aggression of Western forces from local media outlets, and little of the suffering of local Muslims in Iraq and Afghanistan at the hands of foreign fighters.
One information operations strategy might create coverage of the foreign fighter equivalent of the My Lai massacre from Vietnam. North African and Middle Eastern journalists could follow the path of their local foreign fighters and report on Iraqi and Afghan suffering due to their local recruits. Such methods would ideally reduce the perceived value locally of becoming a foreign fighter globally.
Worry about the flow of fighters into Iraq—Worry more about the flow of fighters out of Iraq
While the distribution and number of foreign fighters is alarming, foreign fighters leaving the battlefields in Iraq and Afghanistan are of greater concern. Looking at the hypothetical global foreign fighter flow outlined above, Western military and intelligence efforts continue to dismantle Al-Qaeda in South Asia and Iraq, thwarting top-down recruitment.
Western law enforcement and immigration measures continue to improve identifying emerging cells before becoming operational. However, former fighters from flashpoint cities, the majority of Sinjar fighters, pose a tremendous challenge as national sovereignty prevents Western military, intelligence, and law enforcement assets from effectively penetrating local networks. Instead, the West must rely on North African and Middle Eastern governments to execute counter-radicalization efforts.
These efforts vary in effectiveness and potentially exacerbate local recruitment.
Western counterterrorism elements should make foreign fighter tracking as seamless as foreign fighter recruitment. Integration and analysis of immigration and travel patterns between flashpoint cities, Western countries, Iraq, and Afghanistan must be combined with military efforts overseas and law enforcement efforts locally.
Western countries might tie counterterrorism funding to participation in an international foreign fighter-tracking program, which Western intelligence and law enforcement can utilize to track migration patterns from flashpoint cities.
While executing this will require a delicate touch, it will focus on the real counterterrorism goal, which is preventing trained foreign fighters from creating more attacks globally and recruits locally. Western analysts, from a national to a local level, should establish intelligence tripwires for law enforcement encountering individuals from flashpoint cities.
Reducing global foreign fighter recruitment requires synchronization between the military eliminating formal AQ, diplomatic, surrogate, and information campaigns penetrating foreign fighter networks in flashpoint cities, law enforcement disrupting cells domestically, and intelligence organizations coordinating and synthesizing across all three battlefields.
The foregoing is Article No. 1 (TL068A01) in the Terrorism Literature Report (TLR), No. 68, 22 August 2008, prepared by Interaction Systems Incorporated (isincreports@mindspring.com).
Top of Article
Article 2 Return to TLR Cover Page
2. “Deconstructing Political Orthodoxies on Insurgent and Terrorist Sanctuaries,” by Michael A. Innes, Studies in Conflict and Terrorism, Vol. 31, No. 3, March 2008. [KBTITheory, KBTQNetwork, KBTGStrategies, KBTZGeneral]. Michael A. Innes is affiliated with the School of Politics and International Studies, University of Leeds, Leeds, United Kingdom. We quote from this article from http://www.informaworld.com/smpp/407816798-81458445/content~content=a790743753~db=all~order=page:
. . . There are as many ways, places, and reasons to hide as there are approaches to understanding and locating the hidden. Notions of sanctuary are ubiquitous, embedded in legislative frameworks, political and religious conventions, cultures of hospitality, and codes of honor and revenge the world over. Their varied and subtle facets have traditionally been depicted in ways that relate to individual human beings, but they are also more generally places and spaces apart, where real and perceived challenges to established order can thrive and persist. . . .
. . . In the post-9/11 world, Afghanistan was seen to be the archetypal terrorist base of operations, linking official sponsorship of terrorism, failed state vulnerability to terrorist exploitation, and the absence of international legitimacy that underscores both. Terrorist sanctuaries have since captured the collective attention. The sad truth, evidenced in the post-Cold War record of so-called intelligence failures, is that one knows precious little about the terrorist underground beyond what its denizens choose to reveal.
[Sanctuaries, murky underground far more complex, varied than commonly believed]
One’s perceptions and understanding of terrorism, insurgency, and war have been in a continual process of negotiation with events and trends in Afghanistan and Iraq, in Istanbul, London, and Madrid. Military and counterterrorist campaigns have raised important questions on how one deal’s with security both at home and elsewhere in the world. Terrorist sanctuaries have been at the center of such discussions, and they remain important for several reasons.
Terrorists operate across a broad spectrum of political, insurgent, and criminal realms. Their sanctuaries go to the heart of debates on national security because of the questions they raise about the interface between states and individuals, and the complex moral and practical outcomes of counterterrorist operations. Critics of the War on Terror have pointed to the futility of waging war on a tactic. Its emphasis on denying “sanctuary” and “safe havens” to terrorists, rooted primarily in a thin layer of traditional counterinsurgency theory and poorly conceptualized policy statements, has placed a premium on physical territory, from mountain caves and frontier hideouts to the bordered world of modern states.
To fully understand sanctuaries, however, is to uncover the problems and pitfalls of waging war on locations—exposing the secret lives of multiple hidden worlds, filled with extremists, criminals, soldiers, and spies, with the pious and the profane, with dangers that lie below the surface and in the margins. This murky underground is far more complex and varied than the conventional wisdom suggests.
Terrorists have hidden in plain sight in modern metropolises, used advanced communications technology to build virtual refuges, crafted militant enclaves out of the disarray of failed states, flocked to distinctly unsafe insurgent battlespaces, and generally challenged the protective limits of law, citizenship, and state. . . .
[Conventional wisdom on terrorist sanctuaries incomplete, awkward, often conflicting]
. . . The conventional wisdom [about terrorist sanctuaries] can be summed up as follows:
· Terrorist sanctuaries are embedded within the structures of states, whether those states are strong or deficient.
· They are geographical phenomena, linked to the physical territories of states, often behind poorly secured political and natural borders.
· They are primarily rural phenomena, concentrated in the countryside or on the rugged frontiers between states.
· They are both isolated and accessible, with low population density.
· They provide terrorists the time, space, and resources to gather, organize, learn, rehearse, test and implement plans, weapons, skills, beliefs, and so on.
· They are bases for numerous types of activity, including leadership, financing, command, control, communications, sponsorship, support, propaganda, and recruiting.
Taken in the aggregate, these six pieces of conventional wisdom offer a conceptual point of departure that is incomplete, awkward, sometimes misleading, and often conflicting. . . .
[Policy formulations to deal with terrorist Internet use clearly inadequate for problem set]
. . . Whether terrorists exist as atomized cells along dispersed transnational networks, gather in numbers for training or planning purposes, or coalesce as semi-cohesive squads for insurgent activity in Afghanistan, Chechnya, and Iraq, understanding their clandestine refuges will require a much wider array of considerations than policy perspectives have provided thus far. [Former Deputy Secretary of Defense] Paul Wolfowitz’s four-part typology of democratic, territorial, ideological, and virtual sanctuaries is a case in point.
Consider the geographic emphasis of territory, implying terrain within a well-defined system of political boundaries. The obvious elision is that solitary terrorists need neither vast expanses of countryside nor bordered areas of sovereign territory in which to operate, but rather physical space needed for their personal survival and subsistence. Collapsing or expanding it to fit more or less terrorists is an issue of scale, but does not change the basic corporeal fact of their existence. They occupy the kind of spaces that do not exist in the absence of states, but instead are enabled by channels and conduits that pass between, over and through them—exploitable sites and pathways, in other words, that defy the power and reach of government.
The sovereignty of such space is another debatable quality, encompassing the political entitlements of legitimate states, as well as the human rights of individuals within them. Such sites might be conceived of at two basic levels: macro-level sanctuaries, with defined political or natural borders, including non-state, sub-state, multi-state, and international areas; and micro-level sanctuaries, that operate irrespective of the role, participation, or presence of states. The political geography of terrorist sanctuaries, with its dynamic “small world topology” of place, space, scale, and linkages between them, addresses this multidimensionality and the shearing force between dispersed social networks and the territorial states they overlay.
Consider also that government efforts to qualify public understanding of ideology in this context often come across as thinly veiled cultural critiques. Setting this aside, ideology is constrained in its focus on revolutionary belief-sets or worldviews that can be real or perceived threats to the status quo. The issue is important, but it does not address the range of terrorist preferences or mentalités: the pragmatic needs of terrorists or their movements, the psychological spaces that captured and underground combatants make for themselves, the cultural masks and inhibitors that may guide their and their leaders’ selection of particular sites and forms of refuge, or the measures terrorists take to compartment their own operational and information security.
For jihadi terrorists, for example, martyrdom may ensure the path to heaven, but social welfare and support to the families of suicide attackers arguably offer relief or refuge from economic distress—pointing to what may be poorly understood incentives for terrorist activity. Prisons are another physical location that can offer psychological and intellectual haven for terrorists. Incarceration represents denial of individual freedom, but provides captive audiences in what all too often become breeding grounds for various forms of radicalization. In this context, “ideology” is inadequate to the complexities of terrorist intent, motive, and psychology, and neglects the broader role of incentives, rewards, and context in the calculus of terrorist activity.
Finally, virtuality is a key element of contemporary terrorist threats, facilitating both domestic and transnational terrorism through access to digital and Internet-based channels for command, control, communications, and intelligence (in military terms, “C3I”).
But a policy focus that suggests virtual sanctuaries are little more than Internet-based communications platforms, also potentially exaggerates the disconnect—paradoxically—between the physical spaces occupied by the Internet’s terrorist users, and the informational requirements that guide, inform, and inspire their exploitation of various means of communication—electronic or otherwise. It also minimizes an element of terrorist virtuality directly related to its informational dimensions.
Policymakers have referred repeatedly to terrorist use of the Internet for online recruitment, training, and so on, and called the process “virtual” or the place “cyber” (or vice versa). But virtuality, meaning a perceived or imagined sense of things, is also the basic psychological factor that separates terrorism from other forms of political violence. The fear of horrible death or injury is what makes terrorism such a potent force and what makes it as much a psychological as a physical threat to security. Multiple meanings of virtuality also indicate that this pillar of official policy formulations is clearly inadequate to the problem set.
[Conclusion]
Ultimately, terrorist preferences and requirements governing the role of sanctity, safety, and secrecy are much more relevant than artificial—and hastily constructed—political confections put together by speech writers working under undoubtedly extreme time pressures. Taking into account political objectives and motives, such as degrees of intended subversion, could help establish a more accurate and clearly defined understanding of clandestine and fugitive actors and their refuges.
All of which brings one back to the logic of separating sanctuary from various other aspects of terrorist activity. The conventional wisdom clearly differentiates sanctuary from sponsorship, support, leadership, finance, command, control, communications, and so on. But it also clusters such characteristics into democratic, territorial, ideological, and virtual domains.
The first approach predicates the distinctiveness of sanctuary on its physical attributes, whereas the second identifies a crosshatch of vaguely defined categories. Such policy perspectives do not convincingly identify or reconcile the often confusing array of terrorist-related phenomena. Do they set up false distinctions between what are arguably related issues? Cracks in the system, where terrorist interests, sites, and pathways function as specialized niches of clandestine activity, certainly bear closer study.
Sanctuary, in the broadest sense of the term, might be just as usefully defined according to what terrorists are thinking, and what they are trying to protect, accomplish, or hide from. Critics of the War on Terror have quite rightly pointed to the futility of essentially waging war on a tactic. It is a philosophical turn of phrase, better suited to politicking than defining the practical conduct of war. Waging war on locations is just as problematic.
The foregoing is Article No. 2 (TL068A02) in the Terrorism Literature Report (TLR), No. 68, 22 August 2008, prepared by Interaction Systems Incorporated (isincreports@mindspring.com).
Top of Article
Article 3 Return to TLR Cover Page
3. “Bojinka II: The Transatlantic Liquid Bomb Plot,” NEFA Foundation (Nine/Eleven Finding Answers), April 2008. This item, 23 pages-long and well-documented, is Report No. 15 in the NEFA series, “Target: America.” [KBTDBojinka2, KBTSBritain, KBTSPakWT] From http://www.nefafoundation.org/miscellaneous/FeaturedDocs/Bojinka2LiquidBombs.pdf we quote:
The plotters: England and Pakistan
Following the August 2006 arrest of twenty-four British-born Muslims, the Crown Prosecution Service charged twelve individuals for their role in a conspiracy targeting transatlantic flights. Those charged with conspiracy to murder for “their intention to smuggle the component parts of improvised explosive devices onto aircraft and assemble and detonate them on board” were Ahmed Abdullah Ali, Tanvir Hussain, Brian Young (AKA Umar Islam), Arafat Waheed Khan, Assad Ali Sarwar, Adam Khatib, Ibrahim Savant, Waheed Zaman, Nabeel Hussain, Mohammed Yasar Gulzar, Mohammed Shamin Uddin, and Donald Stewart-Whyte (AKA Abdul Waheed). Further, Mohammed Usman Saddique will be tried separately for preparing acts of terrorism and possessing a “CD containing titles such as ‘Bombs and More.’” And, Cossar Ali, who is Ahmed Abdullah Ali’s wife, was charged with failing to disclose information that “might be of material assistance in preventing the commission of . . . an act of terrorism.” The first trial began in April 2008.
Concurrent with the British arrests, Pakistani authorities arrested seven individuals. Media reports have also asserted that “as many as 50 participants and accomplices were involved,” comprising three cells that “may not have been aware of the others or the extent of their assignment.” As the Wall Street Journal explains [on 11 August 2006], “members of the outer cell purchased supplies, rented apartments, and transferred money needed by members of the inner cell. . . Members of the inner cell planned the attacks and at least some were preparing to participate in the missions. Both the inner and outer cells had been actively preparing the attack for more than six months but all the members may not have known each other.”
Operational details of the plot
The day [10 August 2006] of the United Kingdom arrests, Department of Homeland Security (DHS) Secretary Michael Chertoff announced that the suspects allegedly “engaged in a plot to detonate liquid explosives on board multiple commercial aircraft departing from the United Kingdom and bound for the United States. . . . The terrorists planned to carry the components of the bombs, including liquid explosive ingredients and detonating devices disguised as beverages, electronic devices, or other common objects.” He added, “I would say . . . one of the concerns we had is the possibility of bringing on board a number of different components of a bomb, each one of which would be benign, but when mixed together would create a bomb.” Chertoff further revealed that the suicide bombings were to occur “essentially at the same time.”
Since Chertoff made those initial statements, additional information has come to light about the plotters’ intentions. Multiple press sources have reported that the conspirators planned to bring the liquid explosives onto planes in factory-sealed sports drink bottles modified with false bottoms; ABC News also reported that “the terrorists planned to dye the explosive mixture red to match the sports drink sealed in the top half of the container.” In an August 2007 interview, Michael Chertoff supplemented this data by confirming prior reports that two conspirators intended to bring their baby on board and hide explosives in the infant’s bottle. And to initiate the explosions, open sources indicate the terrorists planned on using the flash from a disposable camera.
Evaluating the plot, Chertoff remarked: “This was a very sophisticated plan and operation. This is not a circumstance where you had a handful of people sitting around coming up with dreamy ideas about terrorist plots. The conception, the large number of people involved, the sophisticated design of the devices that were being considered, and the sophisticated nature of the plan all suggests that this group that came together to conspire was very determined and very skilled and very capable . . . this was a plot that is certainly about as sophisticated as any we’ve seen in recent years. . . .” . . .
The number of flights, carriers, and routes targeted
In the two years prior to the April 2008 trial of eight conspirators, authorities refused to publicly, officially identify the exact number of flights, carriers, and routes targeted by the conspirators. . . . Reflecting the authorities’ uncertainty about the exact intentions of the plotters, August 2006 media reporting, citing anonymous officials, was highly inconsistent, of the number of targeted flights ranging widely. For example, the Wall Street Journal claimed there were six such flights, while The Times Online (London) put the number at 12.
An extraordinarily detailed 28 August 2006 New York Times article, which was based on interviews with “five senior British officials” and which was banned from publication in the United Kingdom to avoid prejudicing potential jurors, asserted that British investigators felt the “estimate of 10 planes” was “speculative and exaggerated.” DHS Secretary Michael Chertoff provided additional insight into this question in an August 2007 interview, when he discussed the consequences of the would-be bombers “bringing liquid explosives on seven or eight aircraft.”
The list of carriers to be attacked has also not been made public, though DHS official Michael P. Jackson noted that the plotters’ focus “centered upon carriers that had direct, non-stop flights between the U.K. and U.S.” And Michael Chertoff stated that the group “focused on . . . U.S.-flagged carriers,” though he provided no further information.
Despite the ambiguity in official circles, media reporting has been far more consistent on this issue, as Continental Airlines, United Airlines, and American Airlines were repeatedly cited by press sources such as the Wall Street Journal, Time, ABC News, and NBC News. Moreover, British Airways was mentioned in a number of open source reports.
Between August 2006 and April 2008, press reporting served as the sole source for information on the routes identified by the operatives. Some of the final destinations mentioned included New York, Washington, D.C., Boston, Miami, Los Angeles, and San Francisco. Then, in a surprise revelation at the start of the conspirators’ trial in April 2008, a British judge and prosecutors revealed that the bombers also planned to target Air Canada flights bound for Toronto and Montreal.
Planned detonation location—over U.S. cities?
In the immediate aftermath of the plot’s disruption, DHS Chief Intelligence Officer Charlie Allen declared, “we have no evidence there was targeting of cities. . . . This was an effort to destroy multiple aircraft in flight—not against any territory of the United States.” DHS Secretary Michael Chertoff added, “I am not aware of any indication that the intent was to make the plane into a weapon.”
However, in October 2006, Mark Mershon, Special Agent in Charge of the FBI’s New York Field Office, told a security conference, “The plan was [to] bring them down over U.S. cities, not over the ocean.” Mershon cited a recent briefing that MI5 delivered to the FBI as his source for the new information; Mershon noted that “it would make your hair stand up to be in the room to hear that presentation.”
Planned timing of the attacks
When the arrests were made on 10 August 2006, some analysts pondered whether the attacks were slated to take place on the fifth anniversary of 9/11. However, government officials have downplayed that speculation. DHS Chief Intelligence Officer Charlie Allen stated, “I am a long-standing believer that terrorist plotters or planners execute when they have all of the plot together. . . . We have no evidence this was timed to any particular holiday or special event.” DHS Secretary Michael Chertoff concurred, saying, “I can tell you our general experience, certainly when you deal with Al-Qaeda . . . is that they’re not necessarily motivated by anniversaries the way sometimes people project.”
Providing additional information on the likely timing of the attacks, Chertoff assessed, “I would say that this plot was well advanced. In other words, they had accumulated and assembled the capabilities that they needed, and they were in the final stages of planning before execution . . . this is not a case where this was just in the initial thought stage. There were very concrete steps underway to execute all elements of this plan.” Interviewed in August 2007, Chertoff supplemented this analysis by revealing, “I got a call telling me that it looked as if the focus had turned . . . [to] an attack on the United States. . . . It also became evident, within 24 hours, that the time frame within which the attack was going to take place, would not be a matter of months but a matter of weeks or even days.”
At the time of their arrests, the conspirators had already researched flight schedules on the Internet; as Kip Hawley, head of the Transportation Security Administration, commented, “They were clicking online all over the place.” The plotters were also allegedly planning to imminently carry out a dry run to ensure they could successfully smuggle bomb components on board.
Additionally, following Pakistan’s arrest of alleged cell member Rashid Rauf—which reportedly took place without British authorities being notified—a co-conspirator communicated an urgent message to the United Kingdom-based network; Franco Frattini, the European Union’s security commissioner, told the media that the British plotters “received a very short message to ‘Go now.’” (According to the New York Times, “a senior British official said the message from Pakistan was not that explicit.”)
However, there is no open source evidence that plane tickets had been bought. And, The New York Times’ lengthy account asserted that two of the individuals lacked passports, though they had requested expedited approval. The Times further reported that British authorities would have continued to monitor the conspiracy, but felt compelled to act when the plotters learned of Rauf’s arrest. The Brits were supposedly concerned that the operatives would destroy evidence, flee, or that an unknown cell would spring into action.
The projected impact of the attacks
If the planned attacks were successfully carried out, the results would have been devastating, as a number of U.S. and British officials have pointed out. When announcing the plot’s disruption, Paul Stephenson, deputy chief of the Metropolitan Police, commented, “this was a plan by terrorists to cause untold death and destruction and commit mass murder.” And British Home Secretary John Reid stated, “Had this plot been carried out, the loss of life to innocent civilians would have been on an unprecedented scale.”
Across the Atlantic Ocean, U.S. authorities echoed these stark assessments. DHS Secretary Michael Chertoff remarked, “I think that the plot, in terms of its intent, was looking at devastation on a scale that would have rivaled 9/11. . . there could have been thousands of lives lost and an enormous economic impact with devastating consequences for international air travel.” New York Congressman Peter King, Chairman of the House Homeland Security Committee, agreed that “we’re talking about thousands of people being killed.”
Bomb-making efforts
In its extensive article on the plot, the New York Times reported that in June 2005, with $260,000 in cash, one of the suspects purchased an apartment on London’s Forest Road that served as a bomb factory for the conspirators. Anonymous British officials told the Times that a number of experiments were conducted and there were likely two bomb-makers. And when MI5 agents carried out a covert search, they purportedly “discovered that the inside of batteries had been scooped out, and . . . it appeared several suspects were doing chemical experiments with a sports drink named Lucozade and syringes. . . .”
Then, again, according to the Times, when authorities raided the Forest Road apartment on 10 August 2006, “they found a plastic bin filled with liquid, batteries, nearly a dozen empty drink bottles, rubber gloves, digital scales, and a disposable camera that was leaking liquid. . . .” What’s more, Commissioner Peter Clarke, head of the Metropolitan Police Service Anti-Terrorist Branch, revealed that “since 10 August we have found bomb making equipment. There are chemicals, including hydrogen peroxide, electrical components, documents, and other items.” . . .
Some press reports have questioned whether the operatives possessed the necessary technical skills to succeed in their mission. However, tests conducted at Sandia National Laboratory confirmed that the explosives formula the suspects were utilizing was viable and capable of causing a “large explosion.” Additionally, NBC News has reported that conspirators tested the mixture in Pakistan.
Recording martyrdom videos—and authoring a last will
Shortly after the arrest of the conspirators, [the Metropolitan Police’s] Peter Clarke . . . announced: “We have . . . found a number of video recordings—these are sometimes referred to as martyrdom videos.” According to the New York Times, six suspects recorded seven videos. . . .
The New York Times asserted that one of the cell members penned a last will and testament, which was located at his brother’s home [and which was dated 24 September 2004]. . . .
Additional material seized by investigators
In a press release issued eleven days after the first arrests in England, [Peter Clarke] said:
“There have been 69 searches. These have been in houses, flats, and business premises, vehicles, and open spaces . . . we have found more than 400 computers, 200 mobile telephones, and 8,000 items of removable storage media such as memory sticks, CDs, and DVDs. So far, from the computers alone, we have removed some 6,000 gigabytes of data.”
Additionally, the New York Times reported that one suspect possessed a “diary that included a list that the police interpreted as a step-by-step plan for an attack. The items included batteries and Lucozade bottles. It also included a reminder to select a date.” When searching some of the suspects’ residences, authorities also discovered an array of jihadist material, including literature and DVDs. Some of those DVDs depicted the purported “genocide” in Palestine and Iraq. Abdullah Azzam’s “Defense of the Muslim Lands” was also reportedly seized at one location in Walthamstow.
The plot’s links to Al-Qaeda
Shortly after the plot’s disruption, U.S. officials made guarded statements about the conspiracy’s links to Al-Qaeda’s central leadership. . . . [DHS’s] Charlie Allen commented, “We’re not convinced this particular operation is connected to the Al-Qaeda chain of command.” DHS Secretary Michael Chertoff concurred, asserting that although “this operation is, in some respects, suggestive of an Al-Qaeda plot . . . we cannot yet form a definitive conclusion.”
The next day, Chertoff added, “certainly in terms of the complexity, the sophistication, the international dimension, and the number of people involved, this plot has the hallmarks of an Al-Qaeda-type plot.”
These DHS analyses were echoed by FBI Director Robert Mueller, who pointed out that the conspiracy “had the earmarks of an Al-Qaeda plot” and was “suggestive of Al-Qaeda direction and planning.” (Congressman Peter King, Chairman of the House Homeland Security Committee, issued the most definitive take, saying, “It clearly is an Al-Qaeda-type operation with links to Al-Qaeda.”)
In contrast to the general reticence of U.S. authorities to firmly tie the plan to Al-Qaeda, Pakistani officials went on the record with a different perspective. For instance, Mahmud Ali Durrani, Pakistan’s ambassador to the United States, declared, “Clear evidence leads to an Al-Qaeda connection in Afghanistan.” In August 2006, some anonymous Pakistani security sources identified now-detained Al-Qaeda official Abu Faraj al-Libi as the mastermind of the plot.
However, in 2007 and 2008 reporting, a different Al-Qaeda mastermind was identified. In September 2007, the Washington Post wrote that Abu Ubaidah al-Masri, an Egyptian serving as Al-Qaeda’s “external operations chief,” was the terror network’s “conduit to the British-Pakistani cells that carried out the 7 July 2005 public transit bombings in London as well as the failed transatlantic airliner plot in Britain in 2006.”
An extensive April 2008 Los Angeles Times article echoed this analysis, quoting an anonymous Western intelligence official who said, “The airline plot is his thing.” The article added that investigators believe al-Masri received instructions from his superiors; a senior British official stated, “We have patchy intelligence on the relationship and structure between external operations figures and [Al-Qaeda number two Ayman al-] Zawahiri and bin Laden. In the really big plots, we think they played a role.” While additional unclassified information remains limited on this topic, a substantial amount of data has come to light on key plotter Rashid Rauf and his alleged ties to Al-Qaeda. . . .
Rashid Rauf’s alleged links to Al-Qaeda and Pakistani extremist groups
After Rashid Rauf’s arrest, Aftab Ahmad Khan Sherpao, the Pakistani interior minister, labeled Rauf a “key Al-Qaeda operative.” Open source reporting has linked Rauf to a number of high-ranking terrorists. For example, NBC News reported that Rauf had contacts with Amjad Hussein Farooqi, whom Sherpao called “the chief Al-Qaeda contact in Pakistan”; Farooqi, who belonged to Laskar-i-Jhangvi and hijacked an Indian Airlines plane in December 1999, was reportedly involved in two assassination attempts on Pakistani President Pervez Musharraf, as well as the murder of Wall Street Journal reporter Daniel Pearl.
NBC further claimed that after accompanying Farooqi to Afghanistan in mid-2002, Rauf “became a regular visitor . . . traveling to various parts of the country to meet Al-Qaeda figures.” In the wake of Farooqi’s death, Rauf allegedly “established . . . direct and regular contact with Abu Faraj al-Libi. . .”, whom the U.S. government believes “was responsible for Al-Qaeda activities and logistics throughout Pakistan.”
Additionally, the Washington Post has claimed that Rauf “reported to” Abu Ubaidah al-Masri, an Egyptian serving as Al-Qaeda’s “external operations chief.” Rauf was also allegedly involved with Jaish-e-Mohammed [JeM], though there is no public evidence tying that organization to the conspiracy. Rauf reportedly became acquainted with JeM’s leadership at the Darul Uloom Madina, a hard-line madrassa founded by his father-in-law. Moreover, Rauf’s wife’s sister married Tahir Masood, the younger brother of the founder of JeM. . . .
The Pakistan connection
A Washington Post report, citing interviews with U.S. and European officials, identified Pakistan as the “hub” of the conspiracy, which “drew financial and logistical support from sponsors operating in Karachi and Lahore.” Moreover, several alleged planners supposedly traveled to Pakistan in the months before their arrest “to seek instructions and confer with unknown conspirators. . . .”
While there are claims some of the individuals attended training camps in Pakistan, with an April 2008 Los Angeles Times article placing the number of attendees at six, this allegation has not been confirmed by official, on-the-record sources. . . .
The foregoing is Article No. 3 (TL068A03) in the Terrorism Literature Report (TLR), No. 68, 22 August 2008, prepared by Interaction Systems Incorporated (isincreports@mindspring.com).
Top of Article
Article 4 Return to TLR Cover Page
4. “Islam and War: A Review Essay,” by John C. Zimmerman, Terrorism and Political Violence, Vol. 20, No. 3, July 2008. [KBTZIslam, KBTTSuicide, KBTZBibliography] Five books are treated in this book review essay by John C. Zimmerman who is affiliated with the University of Nevada Las Vegas: (1) Raymond Ibrahim, editor. The Al-Qaeda Reader. New York: Broadway Books, 2007, 318 pages. Paper $10.85. (2) Shmuel Bar. Warrant for Terror: The Fatwas of Radical Islam and the Duty to Jihad. Lanham, Maryland: Rowman and Littlefield, 2006, 134 pages. Hardcover $16.46. (3) John Kelsay. Arguing the Just War in Islam. Cambridge: Harvard University Press, 2007, 263 pages. Hardcover $16.47. (4) David Bukay. From Muhammad to Bin Laden: Religious and Ideological Sources of the Homicide Bombers Phenomenon. New Brunswick, New Jersey: Transaction Publishers, 2008, 377 pages. Hardcover $49.95. And (5) T. P. Schwartz-Barcott. War, Terror, and Peace in the Quran and in Islam: Insights for Military and Government Leaders. Carlisle, Pennsylvania: Army War College Foundation Press, 2004, 401 pages. Hardcover $26.95. We quote from this article from http://www.informaworld.com/1556-1836:
In April 2002 Al-Qaeda issued a lengthy statement giving seven justifications for targeting civilians in terrorist attacks. Two experts who analyzed the document wrote: “The sheer breadth of these conditions leaves ample theological justification for killing civilians in almost any imaginable situation.”
[Bin Laden: Muslims cannot abandon offensive jihad because it is a basic tenet of Islam]
In The Al-Qaeda Reader, Raymond Ibrahim has translated and masterfully assembled a number of key statements by Osama bin Laden and his chief lieutenant, Ayman al-Zawahiri, that shed light on their views. The centerpiece of this collection is a long exegesis by bin Laden entitled “Moderate Islam is a Prostration to the West.” Most of bin Laden’s communiques are intended to be read in the West as well as by Muslims. However, this statement was solely intended for a Muslim audience. He denounces a declaration by Saudi intellectuals that seeks coexistence with non-Muslims “as if one of the foundations of our religion is how to coexist with infidels” (p. 23).
Bin Laden rejects arguments that the West does not understand Islam. Rather, he acknowledges that there is a great deal of scholarship in the West on Islam. However, the reason for Western hostility is the Islamic doctrine of offensive jihad, which the West wants Muslims to abandon. Offensive jihad requires Muslims to attack non-Muslims and subordinate them to second class citizenship as dhimmis (non-Muslims under Muslim rule). “The West avenges itself against Islam for giving infidels but three options: Islam, jizya [a special tax imposed on non-Muslims], or the sword” (p. 42). Therefore, “Islam is spread with the sword alone, just as the Prophet [Muhammad] was sent forth with the sword” (pp. 46-47).
According to bin Laden, Muslims cannot abandon offensive jihad because it “is an established and basic tenet of this religion” (p. 32). He asks: “Why else did the sword come as an important pillar, enslaving mankind to their Master [Allah]?” (p. 33). Therefore, “Muslims, and especially the learned among them, should spread sharia [Islamic law] to the world—that and nothing else” (p. 33). Waging jihad “is our only option for glory, as has been continuously demonstrated in the [Islamic] texts” (p. 33). He states that “[b]attle, animosity, and hatred—directed from the Muslim to the infidel—is the foundation of our religion” (p. 43).
[Al-Zawahiri: Principle of equality of religions, women in democracies is “blasphemous”]
What is particularly interesting is that bin Laden does not tie his hatred of the West to colonialism, imperialism, Israel, or any of the other perceived grievances often enunciated in communiques intended for foreigners. Here, the offense is Western culture concerning issues like homosexuality and sexuality in general. Since Westerners “transgress the bounds of nature…Muslims are obligated to raid the lands of the infidels, occupy them, and exchange their systems of governance for an Islamic system…” (pp. 50-51).
Zawahiri is as unyielding as bin Laden. He warns Muslims not to befriend infidels. “The Lord Almighty has commanded us to hate the infidels and reject their love” (p. 100). He states that “[b]efriending believers [i.e., Muslims] and battling infidels are critical pillars in a Muslim’s faith” (p. 111). Islam must be made supreme in its own land and then spread “around the world” (p. 113). Democracy and Islam are incompatible because the former is a man-made religion whereas the latter recognizes that “all legislative rights belong to Allah…” (p. 130). The principle of equality in democracies is “blasphemous” because of the equality given to all religions and women. “Islam is so much richer than all these blasphemous principles” (p. 135). On the other hand, “the call to jihad and martyrdom [is] for men and women…” (p. 144).
[Islamic scholars who categorically forbid suicide attacks are few]
Fatwas have received a great deal of attention since 11 September 2001. A fatwa is a religious opinion issued by an Islamic scholar. Such scholars are called the Ulema (learned). In Warrant for Terror: The Fatwas of Radical Islam and the Duty to Jihad, Shmuel Bar masterfully examines the role of fatwas in encouraging terrorism. He makes the common observation that the attempt to reopen the gates of inquiry (known as ijtihad) that were believed to have been closed about 900 years ago, has allowed radicals to co-opt more traditional scholars. Thus, bin Laden’s mentor, the late Abduallah Azzam, who held a doctorate in Islamic studies, wrote: “A few moments spent in jihad in the path of Allah [i.e., fighting for God] is worth more than seventy years spent in praying at home” (p. 39). A Saudi sheikh ruled that 9/11 was justified because the West supports moderate Islam, which “accepts the submission to America…” (p. 53).
Even more mainstream scholars now issue hard-line interpretations. Twenty-eight scholars from Al-Azhar, the world’s leading institution for Islamic learning, issued a statement that killing Israeli civilians in Palestinian suicide attacks was “the noblest act of jihad” (p. 52). Sheikh Tahntawi, when he was head of Al Azhar, reversed his prior position and stated that “every martyrdom operation against any Israeli, including children, women, and teenagers, is a legitimate act…” (p. 63).
Mainstream scholars now issue fatwas that justify fighting American forces in Iraq. Shmuel Bar notes that “[s]cholars who categorically forbid suicide attacks are few” (p. 63). Yusuf Qaradawi, the world’s best known and most influential Islamist, supports Palestinian suicide bombers and Iraqi insurgents. He has also justified the financing of such operations from zakat, the Muslim charity collection intended for the poor.
Interestingly, no fatwas have called for the killing of bin Laden. Bar cites the complaint made in 2004 (still valid today) by the former minister of information for Kuwait that “despite the fact that bin Laden murdered thousands of innocents in the name of our religion … to this date not a single fatwa has been issued calling for the killing of bin Laden…” (p. 98). It might be added that there has been a similar failure in the Arab world to condemn bin Laden as an apostate from Islam. However, Bar does cite a fatwa from an Islamic commission in Spain that condemns bin Laden as an apostate (p. 99).
[History of sharia reasoning a history of conflict where argument often linked with violence]
Jihad is central to warfare in Islam. Literally, jihad means to struggle or strive. However, the predominant contextual meaning of this term in Islamic history is fighting in the way of God, popularly known in the West as holy war. The foundational legal texts written by Imams Malik (d. 795) and Shafi (d. 820), founders of two of the four Sunni schools of Islamic jurisprudence named after them, discuss jihad within the context of fighting.
Similarly, nearly the entire discussion on jihad in the fourteenth century Shafi manual on Islamic law discusses the term as warfare. Islam teaches that Muslims who die must await the final Day of Judgment before gaining entrance to Paradise (or Hell). However, martyrs who die in jihad are granted immediate access to Paradise and thus are able to avoid the “tortures of the grave.” All sins of the martyr are forgiven. Those admitted to Paradise will have many pleasures and advantages. A common belief espoused in some literature is that the martyr will marry 72 virgins.
In Arguing the Just War in Islam, John Kelsay, a veteran academic commentator on Islam, provides valuable insights into the juridical and ideological reasoning that allow for warfare in Islam. He warns that “[t]hose who argue that Islam has nothing to do with the attacks of 9/11 … will find no comfort here. The facts are plain. Osama bin Laden, Ayman al-Zawahiri, and other militants lay claim to some of the central practices and themes of Islamic tradition” (p. 3). However, later on, Kelsay acknowledges that in Islamic legal reasoning on warfare, “attacks are not directly and intentionally aimed at noncombatants” (p. 109).
Fighting is permitted in Islam “in order to resist injustice” (p. 24). The vast majority of Muslims see the expansion of Islam from the seventh century onwards as “an act of divine providence” which established governments that acknowledged Islam as the true religion “and replaced regimes that, by reason of their religious and moral errors, could be described as tyrannical… Islamic expansion thus involved a systematic program of regime change, in which jihad became the symbol for Muslim effort” (p. 38). War was “a means to a political end (establishing an Islamic state), which is itself a means to an overarching religious goal (calling humanity to Islam)” (p. 100). However, forced conversion of non-Muslims to Islam is strictly forbidden under Islamic law.
Kelsay delves deeply into the development of sharia reasoning which seeks “divine guidance in particular contexts [that] can yield disagreement” (p. 77). Since the process of legal reasoning is largely dependent on precedent, there is little room for independent judgment. “It is not surprising, then, that the history of sharia reasoning is a history of conflict, in which argument is often connected with violence” (p. 75).
[Later Quranic verses provided religious justification for 1,000 years of Islamic expansion]
The foundations for jihad in Islam are found in the Quran and hadiths, traditions attributed to the Prophet Muhammad. David Bukay provides a highly critical and in-depth analysis of this source material in From Muhammad to Bin Laden. Thus, “from an Islamic vantage point, all wars in Islam are religious and there is no concept of secular war…” (p. 48) He divides the Islamic views on jihad into four periods corresponding to Muhammad’s life and death.
The first period was devoted to teaching and self-restraint. Muslims were not to engage in fighting.
The second period involved defensive jihad. Here, believers could retaliate if attacked.
The third stage was offensive jihad that culminated in the conquest of Mecca by Muhammad and the consolidation of Islamic rule in Arabia.
The fourth stage was initiated by Muhammad’s followers after his death when they began their invasion and conquest of countries outside of the Arabian Peninsula. Unlike some commentators, Bukay does not see these conquests as benign.
Bukay examines the doctrine of abrogation in Islam, which holds that the earlier more moderate Quranic verses have been abrogated by the later more militant ones. The later Quranic verses have provided the religious justification for the 1,000 years of Islamic expansion from the seventh through seventeenth centuries. The militant Quranic verses, Muhammad’s conquests, and the expansion period have all profoundly affected a wide variety of militants from the Muslim Brotherhood, founded in 1928, to bin Laden and those who share his ideology.
They have also influenced others, who are considered “moderate,” like Yusuf Qaradawi, discussed earlier in this essay. They see a continuing need for Islamic expansion. Bukay does not see Western colonialism as being responsible for contemporary militancy because the 1,000-year Islamic expansion was itself a type of colonialism. He asks: if Western colonialism is responsible for contemporary Middle East violence, “why is there such a high degree of violence inside and from Saudi Arabia, a state without a colonialist past?” (p. 114).
One aspect that should be addressed is Bukay’s citing the eminent historian of Islam, Bernard Lewis, as the first to use the phrase “clash of civilizations” in a 1990 article to describe the conflict between the Islamic world and the West (p. 324). Other writers attribute the phrase to political scientist Samuel Huntington, who used it after Lewis. This is a very common error. In fact, the term was used in 1987 to denote the Islamic-Western conflict by the Islamist writer Sa’id Ayyub, a purveyor of apocalyptic visions and conspiracy theories.
[Most Islamic hadiths show Muhammad disapproved of targeting innocent civilians in war]
T. P. Schwartz-Barcott takes a less pessimistic view than Bukay in War, Terror, and Peace in the Quran and in Islam. He breaks down and analyzes many Quranic verses that deal with fighting, peace treaties, and related topics. He argues that any person who is literate in one national language “can select a few passages from the Qur’an about war and peace that suits his or her preconceptions and purposes” (p. 33).
Yet, U.S. forces in Kabul, Afghanistan, captured material “that indicates that the Qur’an was used extensively in the military training of thirty-nine [Al-Qaeda] recruits” (p. 248).
Schwartz-Barcott notes that there are Quranic verses where it is not difficult to see how some “might use these passages to plan and justify their acts of terrorism…” (p. 62). However, he also argues that some “sword verses” (i.e., Suras 2:190-193 and Sura 9:5) are either mitigated within the verses themselves or mitigated by surrounding verses. Although the Quran does not address many issues involving conduct in war, the most authoritative hadiths (traditions) of Islam show that Muhammad disapproved of targeting innocent civilians in battle.
He develops a table (Appendix A) of 214 battles involving Muslims from 633 to 1982 where he identifies when Muslims were attackers and when they were defenders. He acknowledges the unique nature of Islam’s origins in that “few if any world religions besides Islam were founded by a person [Muhammad] who led his armies in more than twenty-five battles … and ordered his armies to fight more than thirty additional battles during his lifetime” (p. 301).
The book concludes with a number of useful suggestions for policy-makers in dealing with Muslim countries. These involve promoting the protection of religious freedoms and providing humanitarian, educational, and military assistance. He demonstrates how the Quran can be cited to promote peaceful and harmonious relations (pp. 333-334).
The foregoing is Article No. 4 (TL068A04) in the Terrorism Literature Report (TLR), No. 68, 22 August 2008, prepared by Interaction Systems Incorporated (isincreports@mindspring.com).
Top of Article
Return to TLR Cover Page
Subscribe to:
Posts (Atom)