Terrorist pdf
To browse Academia. Log in with Facebook Log in with Google. Remember me on this computer. Enter the email address you signed up with and we'll email you a reset link. Need an account? Click here to sign up. Download Free PDF. Nisheeth Basnet. A short summary of this paper. It has gained considerably increased media attention in recent decades.
Instead, this change brought into sharper focus serious global problems and threats. All these global issues directly affect our wellbeing and security. Terrorism, which we define as politically motivated violence against non-combatants, is an ancient evil. Terrorism provokes deep fear and insecurity more than other forms of violence. South Asia has earned a status of its own as an important area of focus in conflict studies; and why not? South Asia is the second most violent place on earth after Iraq.
Conflicts in Afghanistan and Pakistan have attracted global attention. Parts of India, Sri Lanka, and Nepal have experienced long-running conflict.
Conflicts result in death, misery, social trauma, destruction of infrastructure, and have huge spillover effects. Most problems the South Asian states are facing today stem from their complex internal dynamics with external factors impacting, exasperating and garbling the situation.
Due to the war in Afghanistan, it has had to suffer political consequences domestically, as well as economic costs. Along with inter-state tensions especially with two nuclear states, Pakistan and India, intra-state conflicts have devastating effects in the region.
South Asia has witnessed some very serious inter and intra-state conflicts causing political and economic environment negatively. The region remains at the mercy of international powers politics disturbing domestic and external policies.
In general the security of South Asia greatly depends upon the stable and progressive internal environment of the states. In South Asia intra-state conflicts have amplified in the last few decades.
Whether there are communal riots in India, sectarian and ethnic violence in Pakistan, rift between monarchy and the communist party in Nepal, rivalry and conflict between the main political parties in Bangladesh or the power struggle in Afghanistan after Soviet withdrawal, South Asia faces regional security threats because of internal crisis and conflicts of the states. Being one of the most ethnically, culturally and linguistically diverse regions, it has witnessed many inter-state and intra-state conflicts and war which have disturbed the overall security of the region.
Within states, the ethnic and religious composition of the population is also very diverse. Apart from a large number of ethnic and religious minorities in a state, there are also significant cross- border connections between ethnic and religious communities in the different states. The state boundaries cannot control or enclose ethnically and religiously harmonised regions.
Any security analysis of South Asia would give us a gloomy picture depicting all the ingredients for serious catastrophe. Governance problems, deteriorating security and economic meltdown in most of the countries are making the region vulnerable to a serious stability crisis. Apart from regional concerns and lack of mistrust, domestic conflicts are not restricted within national boundaries, and often these internal issues lead to external conflicts.
Besides ethnic, religious and linguistic diversity, there is great political diversity in the South Asian region. The political systems in this region have produced many forms of government, based on the internal dynamics of each state. This region has seen democracy, socialism, martial law and monarchy. All these eight countries have different religious and ideological foundations.
Bangladesh, India, Maldives and Sri Lanka, are formally secular, although a particular religious majority rule the state in each case. Restraints on the Use of Female Terrorists Terrorists groups are very sensitive to the contexts in which they operate and to social support for their actions that effect both recruitment and funding.
Terror groups generally do not use women if the social context in which they operate does not support it unless circumstances become so difficult as to demand the use of women. For instance when a terrorist group faces heightened security measures they may find that resorting to using female operatives—particularly for suicide missions is necessary because the males can no longer pass through security checkpoints whereas females can.
Poems and eulogies were written to Idris, and shortly after her death fatwas were declared that opened the gates to Palestinian women to take part in the cause. This however did not end the reticence of some Palestinian groups to use women. Zubedi however admitted that many more 7 Speckhard, A. Democracy and Security, 2 1 , Darine Abu Aisha was one of these cases—her sender was desperate to revenge for a Hamas killing and Darine was desperate to take a mission.
Knowing that women in burqas could still breach checkpoints to carry out attacks, the group began to send them in droves. In their context females were more liberated than their Middle Eastern counterparts before the conflicts began—working outside of their homes and dressing in modern clothing, and they simply continued to work alongside their men in the pursuit of terrorism as well.
They did not however rise to leadership positions in their group. Under 'conditions of wife' it states: 'If the Prince of believers [Baghdadi] consents to her carrying out a suicide mission, then her husband should not prohibit her.
Female Suicide Bombers:Dying for Equality? Female suicide bombers in Iraq. Democracy and Security, 5 1 , Schweitzer Ed. Ness Ed. The male leaders judged it better to use them in a suicide mission—sometimes even ordering them at gunpoint into such missions.
Terrorists have also stated that sometimes using women is a disadvantage because they like to talk more than the men and may compromise operational security. The roles for women in terrorist groups vary widely and include: hijacker, trainer, security staffer, sharia enforcer, spy, assassin, bomb maker, seducer and saboteur, wife, courier of messages or funds, fund raiser, recruiter, propaganda maker, translator, suicide operative and so on.
Belgian, Malika al Aroud who was married to Abdessatar Dahman, one of the men who killed General Massoud in Afghanistan while posing as a journalist , for instance ran a website in which she tried to shame men into joining the militant jihad and carrying out criminal acts.
On the subject of beheadings she wrote, "It's not messy or as hard as some may think, It's all about the flow of the wrist… You'll feel the knife hit the wind and food pipe, But Don't Stop, Continue with all your might. Colleen LaRose, an American convert was radicalized online and seduced by her recruiter into plotting to kill Swedish artist, Lars Vilks who had depicted the head of the Prophet on a dog.
Palestinian Amna Muna lured a sixteen Israeli teen, Ofir Rahum, to Ramallah under the pretext of a sexual rendezvous where he was ambushed and shot dead by Fatah militants. IRA member, Donna Maquire was convicted of attempted murder and spying with intent to sabotage after the bombing of British military barracks in Germany. Unpublished article. Belgian Malika Aroud had been a heavy partier and cleaned up her life after finding Islam, as did Muriel Degauque.
Both women married into the movement. Women that are raped may join a terror movement out of anger, a desire for revenge and sometimes because they feel their life chances have been ruined by rape. It should be noted that the rapes are generally from the opposing forces versus from their own cadres, but there have been cases of sexually compromised women being coerced by their own side into suicide operations. Others are simply vulnerable to recruitment because they are seeking personal fulfillment, adventure, personal significance, life purpose or are troubled and even traumatized by the plight of other Muslims or angered by foreign policy responses that play into the ISIS and al Qaeda narrative of Islam, Islamic lands and Muslims supposedly being attacked by the West.
In conflict zones such as Chechnya or Palestine women are often prompted into action by a desire for revenge.
In conflict zones they may have become so traumatized by violence they have witnessed first hand or heard about in their communities that they are willing to give their lives to fight back. Palestinian Arin Ahmed for instance told me that after her militant boyfriend was killed by an Israeli missile the Israelis dispute this she almost immediately abandoned her university and plans to become a banker and volunteered for a suicide mission.
They are much more likely to base their moral reasoning based on caring relationships. For instance the two female suicide operatives who joined their male cadres in taking part in the Beslan school mass-hostage taking were shocked to learn that their target had changed from overtaking FSB headquarters to taking mothers and children in a North Ossetia school.
The female terrorists protested to their male cadres and were told as a result that they could suicide early on in the siege 16 Speckhard, A. In a different voice: Women's conceptions of self and morality. Harvard Educational Review, The men decided the children were going to be held for impossible ransom terms demands for the Russian Federal Forces to immediately quit Chechnya and independence to be granted and some of their parents brutally massacred. According to surviving hostages, the women terrorists refused to carry on with the hostage-taking and either self-detonated after the first day or were shot by their male cadres.
These women are often confined to home or only allowed out in public with family members, which can make it hard to be recruited into a terrorist group by strangers. With the advent of Internet based recruitment and the social media savvy of groups like ISIS and al Qaeda, women are increasingly being reached via the Internet. You cannot overwrite this file.
The following other wikis use this file: Usage on en. Structured data Items portrayed in this file depicts. Namespaces File Discussion. Views View Edit History. Main page Welcome Community portal Village pump Help center. Upload file Recent changes Latest files Random file Contact us. Download as PDF Printable version.
0コメント