This PhD investigates the development of Al Qaeda in the Islamic Maghreb, with a particular focus on the distinction between terrorism and insurgency. The findings have been published in five peer... Show moreThis PhD investigates the development of Al Qaeda in the Islamic Maghreb, with a particular focus on the distinction between terrorism and insurgency. The findings have been published in five peer-reviewed articles, and are joined by an introductory framework and a concluding chapter. The scene-setter contextualizes the problem of terrorism in Mali, describes the fragmented landscape of jihadist groups, analyzes how Tuareg separatism led to AQIM's control of northern Mali, and illustrates how shortcomings in national and local governance fueled insecurity. The second conceptual article analyzed whether AQIM should be regarded as terrorism, insurgency or organized crime, and concluded that - at the time of writing (2016) - most indicators pointed to the group following a strategy of terrorism. A treatise on methodology investigated the discrepancy between the international community's perception of Mali pre-2012 as a stable 'posterboy for democracy', while it was Mali that suffered a near-complete collapse in 2012. It concluded that a quantitative risk approach, rather than a qualitative threat approach, contributed to this misperception. The fourth article applied the first trinity from Clausewitz’s opus On War to Operation Serval, the French military operation to oust AQIM from northern Mali in 2013. Clear political goals, contingency planning, an audacious military operation combined with luck all helped France secure an initial victory against AQIM. The final article focused on potential pathways for AQIM to end, and concluded that in 2021 AQIM followed a strategy of insurgency, while much of the international response remained rooted in the paradigm of counterterrorism. Show less
In the past years, Mali has experienced an unprecedented rise in terrorism. After twenty years of relative peace, the country was shaken to its core in 2012 when a Tuareg-led rebellion overthrew... Show moreIn the past years, Mali has experienced an unprecedented rise in terrorism. After twenty years of relative peace, the country was shaken to its core in 2012 when a Tuareg-led rebellion overthrew the government and the northern parts of the country quickly turned into a safe haven for terrorist groups including Al Qaeda and - in later years - the Islamic State. From 2012 to 2022, a country that was once considered a prime example of African democracy, has been faced with a rapidly downward cycle in terms of stability and security. In the past three years alone, the military staged two coups and Mali is now ruled by a military regime. Two major military and political interventions by the French, operations Serval and Barkhane, the multiple efforts of ECOWAS, and a large UN-mission to the country, MINUSMA, were not able to turn the tide. In a country where it is already a challenge to draw clear lines between the multitude of terrorist, separatist, guerilla and auto-defense groups, it is even more difficult to understand how individuals become involved in terrorist groups. Seeking the answer to that question is the central aim of this study. Based on extensive research among policymakers, prison staff, the international community and those accused and/or sentenced for terrorism, this thesis conducts a multilevel analysis of the process of involvement in terrorism in Mali. The findings suggest that group-level factors including peer pressure, group think, societal tensions and fusion of values were best able to shed light on how individuals become involved with terrorist groups. Especially the relationship between citizens and the state turned out to be an important factor, with prisoners arguing they do not recognize the ruling elite, foreign actors or the borders of the country as they are drawn. With the combination of access to and analysis of unique primary source material, this study offers a nuanced and empirically grounded contribution to the academic and societal debate on terrorism involvement in Mali - with wider implications for the West-African context. While taking into account the inherently subjective nature of narratives, this thesis provides us with a better understanding of why individuals become terrorists given the specific cultural, historical and geographical context within which they have shared their stories. Show less
Online radicalisation has been highlighted by policymakers, the media, and academics as a top security priority in recent years. This thesis unpacks the concept by empirically analysing 201 Islamic... Show moreOnline radicalisation has been highlighted by policymakers, the media, and academics as a top security priority in recent years. This thesis unpacks the concept by empirically analysing 201 Islamic State terrorist actors in the US, discerning their pathways into their eventual activity and assesses the role of the Internet. The findings suggest that that while the Internet is ubiquitous, the online domain does not seem to be replacing face-to-face interactions, nor do terrorists that act online demonstrate substantially different experiences to those that do not. In fact, using the Internet may be a hindrance, rather than a help, to would-be terrorists.The findings also posit three interrelated radicalisation dynamics: Firstly, the consumption of propaganda is part of an ongoing socialisation process in which individuals take to social media to play out a staged authenticity to their peers. Secondly, an examination of the female terrorists shows that many use the Internet to circumvent gender restrictions and instead carve out a radical identity for themselves. Finally, the Internet can act as a “buyers’ market” of limitless information in which would-be terrorists can fulfil their needs in a space with fewer restrictions or constraints. The thesis concludes by outlining its contributions to the academic literature at the empirical, theoretical, and policy-level. Show less
Western Europe has been confronted with several terrorist attacks over the past years. This dissertation investigates what happens after such attacks. Scholars emphasise that terrorism is not just... Show moreWestern Europe has been confronted with several terrorist attacks over the past years. This dissertation investigates what happens after such attacks. Scholars emphasise that terrorism is not just about killing, as terrorists want to capture the attention of the audience. Yet, what these audiences do after attacks has remained understudied. This dissertation looks into the meaning-making process after jihadist attacks in Brussels, Nice, Berlin and Manchester (2016-2017). The study focuses on two core actors groups - the authorities and citizens - and the use of frames, rituals and symbols. Special attention is paid to the first day, the first week and the first anniversary of the attack, for which the author has visited the commemorations. Overall, this dissertation shows how terrorism is not a successful communication strategy. After performing the opening acts, the terrorists are quickly pushed off stage, doomed to stand behind the curtains and watch a different play unfold. Show less
How and why do people become involved in European homegrown jihadism? Why do only some of those who participate in such groups actually go on to use violence? The main objective of this PhD thesis... Show moreHow and why do people become involved in European homegrown jihadism? Why do only some of those who participate in such groups actually go on to use violence? The main objective of this PhD thesis is to address these overarching questions through an in-depth case study of an influential homegrown jihadist group; namely, the Dutch ‘Hofstadgroup’ which was active between 2002 and 2005. The group’s planned and perpetrated acts of violence, most notoriously the murder of filmmaker Theo van Gogh in November 2004, have had an impact on Dutch society that is felt to this day. More importantly, the group is a leading example of a typology of terrorism that continues to pose a challenge to Western states’ security. An understanding of the various processes through which the Hofstadgroup’s participants became involved, and which led some to plan and perpetrate acts of terrorism, therefore remains of considerable relevance to academics, policy makers and counterterrorism practitioners today. By using police files on the Hofstadgroup and interviews with former participants, the thesis adds a large quantity of new information to a field often charged with recycling existing insights and uses that information to assess existing assumptions about the processes leading to terrorism. Show less
The rise of ISIS and the recent terrorist attacks in Europe have raised a collective alertness for a potential terrorist attack. The presence of jihadist networks in the Netherlands, and the... Show moreThe rise of ISIS and the recent terrorist attacks in Europe have raised a collective alertness for a potential terrorist attack. The presence of jihadist networks in the Netherlands, and the significant outflow of young people to conflict areas in the Middle East to join the jihad, have greatly enhanced this anxiety. But how are these networks organized and how do they prepare their jihad? How do people get involved in jihadist networks and how important is ideology in that regard? Answering such questions will help to understand how jihadist networks operate, which can be useful knowledge for policy makers and practitioners who aim to counter terrorist threats. Using unique data from police files, interviews, and trial observations, while utilizing different analytical methods, this study provides an in-depth insight into the modus operandi of jihadist networks in the Netherlands. The findings show how jihadist networks have changed over the years and how this development has affected the way jihadists operate. Show less
While terrorism is one of the most prominent security threats in the Western world, there is surprisingly little research that adresses the effectiveness of the instruments that are used to fight... Show moreWhile terrorism is one of the most prominent security threats in the Western world, there is surprisingly little research that adresses the effectiveness of the instruments that are used to fight it. In this doctoral dissertation national and international security expert Teun van Dongen will fill this gap by demonstrating that there is a link between the nature of a terrorist threat and the effects of the measures that are applied against it. He will outline a new way to measure coun-terterrorism effectiveness and will apply it to the counterterrorist cam_paigns against the Provisional IRA, ETA, the Weather Underground, the RAF and the jihadist movements in the UK and the Netherlands. The results show that the effect of counterterrorism measures depends to a considerable degree on the way terrorist organisations or movements are organised and on the way they interact with the population Show less
The thesis analyses international law and practice in relation to terrorism and counter-terrorism in the post 9/11 environment. It finds terrorism to be a term of acute and wide-ranging political... Show moreThe thesis analyses international law and practice in relation to terrorism and counter-terrorism in the post 9/11 environment. It finds terrorism to be a term of acute and wide-ranging political significance yet one which is not defined under generally accepted treaty or customary international law. Despite this, a detailed international legal framework existed before 9/11 but has been supplemented since then, that provide the parameters for state responses to international terrorism. The thesis explores the proliferation of counter-terrorism practice on national, regional and international levels since 9/11 alongside this framework. Many particular responses and the legal issues they give rise to are explored, including Guantanamo and other examples of arbitrary detention, extraordinary renditions, targeted killings, terrorism trials, the erosion of safeguards against torture, sanctions regimes, surveillance pr actices, the prohibition on ‘association’ and the increasingly ‘preventive’ role of criminal law. It is suggested that this practice does not reveal seismic Grotian moments of international legal transformation, gaping holes in international protection or the need for new law. It does however reveal certain characteristics as regards the approach to the legal framework, which include extreme selectivity of application, a spreading ‘exceptionalism,’ distorted ‘purposive’ legal interpretations, excessive secrecy, arbitrariness and a lack of accountability. Evolving international reactions, including judicial reactions, have been and will continue to be critical to the ultimate impact of the ‘war on terror’ on international standards. The study questions the long term implications of the ‘war on terror’ for states and individuals responsible, for third states and for the international rule of law Show less
In discussing extremism, the key questions are: to whom is a duty owed and what are the limits of intolerance that are to be tolerated? Answering these questions requires examining limits and... Show moreIn discussing extremism, the key questions are: to whom is a duty owed and what are the limits of intolerance that are to be tolerated? Answering these questions requires examining limits and rights; analyzing them in the context of extremism is the ‘core’ of this book. While freedom of speech and freedom of religion are vital to democracies, the freedoms are not unlimited. Where to draw the line between permissible and impermissible is complicated. Religious and secular extremists pose dangers to society and individuals alike; the question I will seek to answer to what extent should, and does, society protect itself against a readily identifiable threat. Whether society chooses to ‘see’ that threat is essential to the discussion; examining why the threat is minimized, at best, and ignored, at worst, is a classic example of history repeating itself. The extremist, in addition to taking the law into his own hands, unequivocally rejects restrictions and limitations imposed by society intended to preserve civil and social order. As discussed in chapter one, I define extremism as a powerful combination of violence and ideology that must necessarily always be “correct” in the mind of its believers. For those believers their ideology is invariably “the truth” and must be defended at all costs. Show less
The thesis deals with the history of terrorism and counter-terrorism legislation, focussing on the legislation in the UK, Spain, Germany and France, in the last 30 years, and analysing its... Show moreThe thesis deals with the history of terrorism and counter-terrorism legislation, focussing on the legislation in the UK, Spain, Germany and France, in the last 30 years, and analysing its compatibility with national and European human rights standards. Show less
In this PhD study the interface between legal governments and corporations on the one hand, and transnational criminals at the other hand, is analysed in depth. In the first part of the book, a... Show moreIn this PhD study the interface between legal governments and corporations on the one hand, and transnational criminals at the other hand, is analysed in depth. In the first part of the book, a typology of interfaces is developed that can be used to describe interfaces between legal and illegal actors. Furthermore, an analytical model, the so-called lockmodel, is developed with which the 'laundering' of all kinds of transnational crime can be understood. The analysis is based on the literature on transnational crime as well as a range of case-studies. The case studies include e.g. individual arms traffickers, commercial banks, intelligence agencies, charities, bank secrecy jurisdictions etc. The second part of the book discusses the results of an empirical study of the illicit art and antiquities trade that was part of the PhD project and which has hardly been studied before by criminologists. With the collected data, the use of the typology and lockmodel is looked at. It shows that the laundering of stolen art and antiquities can be understood by the lockmodel that was developed on the basis of other crimes. Finally, an extensive overview of the illicit art and antiquities trade is provided. Show less