SlideShare a Scribd company logo
1 of 11
Muslim Ideologies :Terrorism AND Insurgency
Saron M. Obia
Pan African Institute for Development
West Africa
PAID-WA Buea, Cameroon
Outline
 What is the meaning of ideology?
 What is terrorism?
 How were these ideologies developed?
 What are the types of terrorism involved?
 Why do they engage in terrorism?
 What is an insurgency?
 What are the difference between terrorism and insurgency?
 Are these ideologies just or unjust?
 Recommendations
What is the meaning of ideology?
The word ideology has been conceptualize in different scientific studies. In international security (international
conflicts), the term has been restructured, as well as in Geo-Science (That is geopolitics and geostrategy).
The term ideology is used to shape the radicalization of certain Muslims or unorthodox Muslims. According to the
Cambridge Advanced Learner’s Dictionary, ideology is a set of beliefs or principles, especially one on which a
political system, party or organization is based. We now take the situation in Africa and Western world, where there is
increasing violence (the use f extreme force to achieve one’s goal).The ideologies developed by radical Muslims are;
-Terrorism and
-Insurgency
For proper understanding, we must know who is a Muslim. A Muslim is a person who follows the religion of Islam as
provided by prophet Mohammed, the founder of Islam as inscripted in the Holy Koran.
CAMBRIDGE ADVANCED LEARNER’S DICTIONARY,CAMBRIDGE UNIVERSITY PRESS
What is terrorism?
The use positive terminology to describe groups or individuals as freedom fighters, revolutionaries and liberators,
have given a different meaning to terrorism. Which adapts to the famous slogan “one man’s terrorist is another man’s
freedom fighter”. Examples are Hezbollah, Boko-Haram and Castro, who stood to this slogan.
The problem with terrorism, is how to be defined and how is perceived by others. As such, some discussions relay on
who does it and for what purpose. That is;
 Some focus on terrorist acts or tactics to define the term
 The actors or the context whether military or not
 The characteristics of terrorism as concerns international security.
One of the definitions that has stood to the taste of times is that of Berto Jongman and Alex Schmidt in 1988.That
terrorism is the use of violence, the techniques used, the nature about the use of fear, the level of organization and
ideology. The discussion will be centered on two main types of terrorism, organized terrorism and cyber terrorism,
following its evolution in international conflicts.
How were these ideologies developed?
The ideology (terrorism) originated as a state action, with the French revolution state reign of terror in political
affairs. The term terrorism which appeared both in English and French usage in the 18 century was associated with
any use of violence to achieve a political goal. The American and French revolutions unleashed the idea that people
could overthrow dictatorial rules. The concept appeared in the Arab convention for the suppression of terrorism of
1998 in Egypt, with a clear definition with precise components.
In Arab world there is a challenge in authorities between the religious and state leader. In Iran 1973 the spiritual
leader kick out the state leader, because the spiritual leader has the final decision. Also, Al- Qaeda (organizational
structure 1988-2001), Talibans, ISIS and ISIL, the rise of youths like the Arab spring in Tunisia.
In Nigeria 2009, Boko-Haram started getting youths support and economic assistance through kidnapping of
foreigners and nationals in Cameroon and Nigeria. Though the focus has been on Boko-Haram, several radical groups
like Al Shabab,M23 and Seleka rebels exist. One of their main objective is the fight against social and economic
injustice, but Boko-Haram believes that democracy is for anti-Muslims (Western Education is a sin).
Malcolm W. Nance (2013), Terrorist Recognition Handbook, A Practitioner’s Manual for Predicting and Identifying Terrorist Activities, Third Edition
What are the types of terrorism involved?
We could say that, this is the age of terrorism, as major security challenge of the post cold war era. There are many
types of terrorism as conceived by researchers. The Cameroon community of political sciences evoked four main
types of terrorism; individual terrorism, organized terrorism, state terrorism and cyberterrorism. But the discussion
will be base on two, as follows;
 Organized terrorism (example Al Qaeda and Bok-Haram)
 Cyber terrorism (examples of cyberterrorist activities on the web; Irhabi 007, Al-Jinan, Inhiyar Al-Dolar, 'Abu
Syf3r' Defaces Internet Haganah and Q8Army)
The above has also been related radical ideologies of spiritual leaders like Imam Samudra (Sentenced to death for
2002 Bali bombings) and Imam Abubakar Shekau. If the main objective is to establish caliphates, why then use
violence. But the problem has always been whether terrorism can be just. As such, discussions have centered on two
cases; If these ideologies are for religious issues or for political issues.
David Altheide in Terrorism and the Politics of Fear
Dorothy E. Denning in The Jihadi Cyber terror Threat
E. Alshech, Cyberspace as a Combat Zone: The Phenemenon of Electronic Jihad, MEMRI, No. 329, Feb. 27, 2007
http://haganah.org.il/haganah/
Why do they engage in terrorism?
Trotsky once said “ Maybe the war does not interest you but war is interested in you”. They are many reasons evoked
by radical individuals or groups engaged in the new world system. Some of these arguments are as follows;
 They are resisting against political oppression in and out of their countries.
 The political situation in Israel-Palestine and Iraq following the U.S intervention but also the proliferation of
foreign interventions in Syria and Libya
 Arab youths against international system example Otto man empire
 Against repression; Arab spring and against H. Mubarack
 Against Israel; alliance with the Anglo- Americans and insecurity of the Sunnites
 Websites that harm or are offensive to Islam are been defaced example defacement of Danish websites (caricature
of Mohammed) and attack against Vatican Website
Dorothy E. Denning in The Jihadi Cyber terror Threat
http://www.zone-h.org/en/defacements/mirror/id=3281674/
What is an insurgency?
According to the 1970 writer, Richard H. Sanger the modern era has experienced seven great waves of insurgencies
from the English Revolution of 1648-88 to the cyclone of violence that swept the Third World after World War II.
Insurgency refers to the use of low-level, protracted violence to overthrow a political system or force some sort of
fundamental change in the political and economic status quo with a certain level of persistence. After all, it has been
one of the most pervasive types of conflict throughout history and todays epidemic.
Throughout this discussion, we are encouraged to think critically and analytically about the complex causes of many
contemporary issues and problems based on the radicalization of some Muslims. International conflicts is faced with
two ideologies; that of terrorism and insurgency. The contemporary focus, is which of the current team belongs to an
insurgency or terrorist organization. In security presentation, Saron argued that; ISIS, Al Shabab, Talibans and Anti
Balaka are insurgencies, while Al Queada, Boko-Haram and Hezbollah could be considered terrorist organizations.
Though the have been some contradiction to this statement, based on the recent development of geopolitics.
Richard H. Sanger (1970), Insurgent Era: New Patterns of Political, Economic, and Social Revolution, revised edition, Washington: Potomac Books, 1970, pp. 2-4.
Raj Desai and Harry Eckstein (1990), "Insurgency: The Transformation of Peasant Rebellion," World Politics, Vol. 42, No. 4, July 1990, pp. 443-444.
What are the difference between terrorism and
insurgency?
Terrorism Insurgency
 The use of violence to express a certain ideology. An
example bombing of Hiroshima,9/11 by Al Qaeda,
Boko-Haram attacks on northern Nigeria and
Cameroon. An weapons usually used are WMD and
sophisticated technology (cyber attacks).
 Terrorism remains a major threat at the national,
regional and international peace and security. This is
because, there is deliberate violation of international
law and human rights. An example is Boko-Haram
attack on soft targets like churches, markets, security
base.
 The persistence use of violence because of
frustration and the weakness to challenge the
political order through conventional military ways.
Example is ISIS and the Anti Balaka in Central
Africa Republic.
 The development of new trends, will be point in the
next decades. It may be related to terrorism on this
point, the spiritual insurgency which is based on
political violence and religion. Also associated with
secularization, the strains of modernization spawned
a religious renaissance. An example is the Al Shabab
attack on Kenya
Are these ideologies just or unjust?
The study of international security is more than human violence, war is the worst idea that can ever be evoked when
discussing security at the national, regional and international level. This account for the creation of legal jurisdictions
like the international criminal court (ICC) and the international court of justice (ICJ). The idea of justifying war may
seem bizarre, especially in Christian countries, which religion is anti-militarist.
It becomes paradoxical because the Christians have found justification for the war a just war, they argue that is a war
in accordance with law, natural law and morality. This concept is ambiguous, because they are always leaders or
countries ready for war. But war can only be justified if defensive and conducted to protect the weakest.
Just war is a concept first evoked by the “West”, meanwhile the concept of jihad was neglected or never discussed.
which is a form of just war because it is holy war. It is a codified principle in the Holy Koran, which is eventually not
used today because of the new world order (Terrorism).As such, terrorism and insurgency are major security threats to
the world and can never be considered just.
CAMEROON COMMUNITY OF POLITICAL SCIENCES 2012-2013
Recommendations
 The Westphalia treaty should be seriously implemented, with its core principles of ; sovereignty, equality and non
interference in other state.
 The respect for every religion, language and person. NB: mostly the caricature or satiric images of the Muslim
religious leader, be it on social networks or journals.
 There should be the control of the arm industry and weapons of mass destruction.
 The definition of a state should be revised. This is because, if a state is based on a territory, sovereignty and a
government, why is Palestine not given that opportunity.

More Related Content

What's hot

SECURITY: DOMESTIC AND INTERNATIONAL
SECURITY: DOMESTIC AND INTERNATIONALSECURITY: DOMESTIC AND INTERNATIONAL
SECURITY: DOMESTIC AND INTERNATIONALFaHaD .H. NooR
 
Terrorism and International Relations
Terrorism and International RelationsTerrorism and International Relations
Terrorism and International RelationsRubaiyat Rahman
 
WORLD ORDER AND GLOBAL GOVERNANCE
WORLD ORDER AND GLOBAL GOVERNANCEWORLD ORDER AND GLOBAL GOVERNANCE
WORLD ORDER AND GLOBAL GOVERNANCEFaHaD .H. NooR
 
Introduction To Terrorism
Introduction To TerrorismIntroduction To Terrorism
Introduction To TerrorismFaheem Ul Hasan
 
Deterrence Theory in International Relations
Deterrence Theory in International RelationsDeterrence Theory in International Relations
Deterrence Theory in International RelationsBalaram Pradhan
 
Terrorism causes, effects, and solutions
Terrorism causes, effects, and solutionsTerrorism causes, effects, and solutions
Terrorism causes, effects, and solutionsSrun Sakada
 
International Security 3
International Security 3International Security 3
International Security 3alw1125
 
Nuclear Proliferation
Nuclear ProliferationNuclear Proliferation
Nuclear ProliferationMrG
 
Foreign policy assignment
Foreign policy assignmentForeign policy assignment
Foreign policy assignmentjcimunhrc
 
Foreign Policy and National Defense
Foreign Policy and National DefenseForeign Policy and National Defense
Foreign Policy and National DefenseChris Thomas
 
The Chief Defects of the Collective security system
The Chief Defects of the Collective security systemThe Chief Defects of the Collective security system
The Chief Defects of the Collective security systemshahidgajiawala
 
Foreign policy determinants
Foreign policy determinantsForeign policy determinants
Foreign policy determinantsKhan Zeb
 
Disarmament & Arms Control
Disarmament & Arms ControlDisarmament & Arms Control
Disarmament & Arms Controlgueste59d722
 

What's hot (20)

SECURITY: DOMESTIC AND INTERNATIONAL
SECURITY: DOMESTIC AND INTERNATIONALSECURITY: DOMESTIC AND INTERNATIONAL
SECURITY: DOMESTIC AND INTERNATIONAL
 
REALISM
REALISMREALISM
REALISM
 
The clash of civilizations
The clash of civilizationsThe clash of civilizations
The clash of civilizations
 
Terrorism and International Relations
Terrorism and International RelationsTerrorism and International Relations
Terrorism and International Relations
 
WORLD ORDER AND GLOBAL GOVERNANCE
WORLD ORDER AND GLOBAL GOVERNANCEWORLD ORDER AND GLOBAL GOVERNANCE
WORLD ORDER AND GLOBAL GOVERNANCE
 
Introduction To Terrorism
Introduction To TerrorismIntroduction To Terrorism
Introduction To Terrorism
 
Deterrence Theory in International Relations
Deterrence Theory in International RelationsDeterrence Theory in International Relations
Deterrence Theory in International Relations
 
Terrorism causes, effects, and solutions
Terrorism causes, effects, and solutionsTerrorism causes, effects, and solutions
Terrorism causes, effects, and solutions
 
Diplomacy
DiplomacyDiplomacy
Diplomacy
 
International Security 3
International Security 3International Security 3
International Security 3
 
Nuclear Proliferation
Nuclear ProliferationNuclear Proliferation
Nuclear Proliferation
 
NINE TRACKS IN THE MULTI-TRACK SYSTEM
NINE TRACKS IN THE MULTI-TRACK SYSTEMNINE TRACKS IN THE MULTI-TRACK SYSTEM
NINE TRACKS IN THE MULTI-TRACK SYSTEM
 
Us foreign policy
Us foreign policyUs foreign policy
Us foreign policy
 
Foreign policy assignment
Foreign policy assignmentForeign policy assignment
Foreign policy assignment
 
Transnational crime
Transnational crimeTransnational crime
Transnational crime
 
Foreign Policy and National Defense
Foreign Policy and National DefenseForeign Policy and National Defense
Foreign Policy and National Defense
 
The Chief Defects of the Collective security system
The Chief Defects of the Collective security systemThe Chief Defects of the Collective security system
The Chief Defects of the Collective security system
 
Foreign policy determinants
Foreign policy determinantsForeign policy determinants
Foreign policy determinants
 
Disarmament & Arms Control
Disarmament & Arms ControlDisarmament & Arms Control
Disarmament & Arms Control
 
DIPLOMACY AND FOREIGN POLICY
DIPLOMACY AND FOREIGN POLICYDIPLOMACY AND FOREIGN POLICY
DIPLOMACY AND FOREIGN POLICY
 

Similar to Muslim Ideology: Terrorism And Insurgency

Muslim World in encountering terrorism(journal paper)
Muslim World in encountering terrorism(journal paper)Muslim World in encountering terrorism(journal paper)
Muslim World in encountering terrorism(journal paper)Mohd Abbas Abdul Razak
 
Tactical Adoption of Terrorism by Islamic Insurgency
Tactical Adoption of Terrorism by Islamic InsurgencyTactical Adoption of Terrorism by Islamic Insurgency
Tactical Adoption of Terrorism by Islamic InsurgencyPatrick Thomas Cannon
 
The Importance of Student Counselling to Prevent Terrorism
The Importance of Student Counselling to Prevent TerrorismThe Importance of Student Counselling to Prevent Terrorism
The Importance of Student Counselling to Prevent TerrorismMahmudur Rahman Shojib
 
The_Global_Terrorism_Threats_to_the_Stat.pdf
The_Global_Terrorism_Threats_to_the_Stat.pdfThe_Global_Terrorism_Threats_to_the_Stat.pdf
The_Global_Terrorism_Threats_to_the_Stat.pdfMohammed Saaida
 
Goals and motivations of terrorism
Goals and motivations of terrorismGoals and motivations of terrorism
Goals and motivations of terrorismarpslides
 
Terrorism and counter terrorism strategy
Terrorism and counter terrorism strategyTerrorism and counter terrorism strategy
Terrorism and counter terrorism strategyabhnishat094
 

Similar to Muslim Ideology: Terrorism And Insurgency (9)

Muslim World in encountering terrorism(journal paper)
Muslim World in encountering terrorism(journal paper)Muslim World in encountering terrorism(journal paper)
Muslim World in encountering terrorism(journal paper)
 
Tactical Adoption of Terrorism by Islamic Insurgency
Tactical Adoption of Terrorism by Islamic InsurgencyTactical Adoption of Terrorism by Islamic Insurgency
Tactical Adoption of Terrorism by Islamic Insurgency
 
Essay On Terrorism In India
Essay On Terrorism In IndiaEssay On Terrorism In India
Essay On Terrorism In India
 
Application1
Application1Application1
Application1
 
The Importance of Student Counselling to Prevent Terrorism
The Importance of Student Counselling to Prevent TerrorismThe Importance of Student Counselling to Prevent Terrorism
The Importance of Student Counselling to Prevent Terrorism
 
The_Global_Terrorism_Threats_to_the_Stat.pdf
The_Global_Terrorism_Threats_to_the_Stat.pdfThe_Global_Terrorism_Threats_to_the_Stat.pdf
The_Global_Terrorism_Threats_to_the_Stat.pdf
 
Goals and motivations of terrorism
Goals and motivations of terrorismGoals and motivations of terrorism
Goals and motivations of terrorism
 
Essay On Terrisom
Essay On TerrisomEssay On Terrisom
Essay On Terrisom
 
Terrorism and counter terrorism strategy
Terrorism and counter terrorism strategyTerrorism and counter terrorism strategy
Terrorism and counter terrorism strategy
 

More from SARON MESSEMBE OBIA

Jihad and just war a religious game
Jihad and just war a religious gameJihad and just war a religious game
Jihad and just war a religious gameSARON MESSEMBE OBIA
 
Prostitution and cyber insecurity in cameroon
Prostitution and cyber insecurity in cameroonProstitution and cyber insecurity in cameroon
Prostitution and cyber insecurity in cameroonSARON MESSEMBE OBIA
 
The saron messembe conflict theory
The saron messembe conflict theoryThe saron messembe conflict theory
The saron messembe conflict theorySARON MESSEMBE OBIA
 
Understanding boko haram in nigeria
Understanding boko haram in nigeriaUnderstanding boko haram in nigeria
Understanding boko haram in nigeriaSARON MESSEMBE OBIA
 
Understanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminalsUnderstanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminalsSARON MESSEMBE OBIA
 
African union transition and its ability to respond to conflicts in africa
African union transition and its ability to respond to conflicts in africaAfrican union transition and its ability to respond to conflicts in africa
African union transition and its ability to respond to conflicts in africaSARON MESSEMBE OBIA
 
International terrorism scope, causes and the role of education in combating ...
International terrorism scope, causes and the role of education in combating ...International terrorism scope, causes and the role of education in combating ...
International terrorism scope, causes and the role of education in combating ...SARON MESSEMBE OBIA
 
Forensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in CameroonForensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in CameroonSARON MESSEMBE OBIA
 

More from SARON MESSEMBE OBIA (20)

Jihad and just war a religious game
Jihad and just war a religious gameJihad and just war a religious game
Jihad and just war a religious game
 
When time calls
When time callsWhen time calls
When time calls
 
The transfiguration of Africa
The transfiguration of AfricaThe transfiguration of Africa
The transfiguration of Africa
 
Why i hail my enemies
Why i hail my enemiesWhy i hail my enemies
Why i hail my enemies
 
Above poverty
Above povertyAbove poverty
Above poverty
 
The battle
The battleThe battle
The battle
 
Pick the coin
Pick the coinPick the coin
Pick the coin
 
Prostitution and cyber insecurity in cameroon
Prostitution and cyber insecurity in cameroonProstitution and cyber insecurity in cameroon
Prostitution and cyber insecurity in cameroon
 
The crusade
The crusadeThe crusade
The crusade
 
The saron messembe conflict theory
The saron messembe conflict theoryThe saron messembe conflict theory
The saron messembe conflict theory
 
Spy glass
Spy glassSpy glass
Spy glass
 
Divorce
DivorceDivorce
Divorce
 
Understanding boko haram in nigeria
Understanding boko haram in nigeriaUnderstanding boko haram in nigeria
Understanding boko haram in nigeria
 
Understanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminalsUnderstanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminals
 
The only pen
The only penThe only pen
The only pen
 
African union transition and its ability to respond to conflicts in africa
African union transition and its ability to respond to conflicts in africaAfrican union transition and its ability to respond to conflicts in africa
African union transition and its ability to respond to conflicts in africa
 
Pan africanism why
Pan africanism whyPan africanism why
Pan africanism why
 
My chibok sister
My chibok sisterMy chibok sister
My chibok sister
 
International terrorism scope, causes and the role of education in combating ...
International terrorism scope, causes and the role of education in combating ...International terrorism scope, causes and the role of education in combating ...
International terrorism scope, causes and the role of education in combating ...
 
Forensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in CameroonForensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in Cameroon
 

Recently uploaded

Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatmentnswingard
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoKayode Fayemi
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfSenaatti-kiinteistöt
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIINhPhngng3
 
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...Pooja Nehwal
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxraffaeleoman
 
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Delhi Call girls
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lodhisaajjda
 
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verifiedSector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verifiedDelhi Call girls
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCamilleBoulbin1
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Baileyhlharris
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Vipesco
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfSkillCertProExams
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaKayode Fayemi
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...amilabibi1
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalFabian de Rijk
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar TrainingKylaCullinane
 

Recently uploaded (18)

Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verifiedSector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptx
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 

Muslim Ideology: Terrorism And Insurgency

  • 1. Muslim Ideologies :Terrorism AND Insurgency Saron M. Obia Pan African Institute for Development West Africa PAID-WA Buea, Cameroon
  • 2. Outline  What is the meaning of ideology?  What is terrorism?  How were these ideologies developed?  What are the types of terrorism involved?  Why do they engage in terrorism?  What is an insurgency?  What are the difference between terrorism and insurgency?  Are these ideologies just or unjust?  Recommendations
  • 3. What is the meaning of ideology? The word ideology has been conceptualize in different scientific studies. In international security (international conflicts), the term has been restructured, as well as in Geo-Science (That is geopolitics and geostrategy). The term ideology is used to shape the radicalization of certain Muslims or unorthodox Muslims. According to the Cambridge Advanced Learner’s Dictionary, ideology is a set of beliefs or principles, especially one on which a political system, party or organization is based. We now take the situation in Africa and Western world, where there is increasing violence (the use f extreme force to achieve one’s goal).The ideologies developed by radical Muslims are; -Terrorism and -Insurgency For proper understanding, we must know who is a Muslim. A Muslim is a person who follows the religion of Islam as provided by prophet Mohammed, the founder of Islam as inscripted in the Holy Koran. CAMBRIDGE ADVANCED LEARNER’S DICTIONARY,CAMBRIDGE UNIVERSITY PRESS
  • 4. What is terrorism? The use positive terminology to describe groups or individuals as freedom fighters, revolutionaries and liberators, have given a different meaning to terrorism. Which adapts to the famous slogan “one man’s terrorist is another man’s freedom fighter”. Examples are Hezbollah, Boko-Haram and Castro, who stood to this slogan. The problem with terrorism, is how to be defined and how is perceived by others. As such, some discussions relay on who does it and for what purpose. That is;  Some focus on terrorist acts or tactics to define the term  The actors or the context whether military or not  The characteristics of terrorism as concerns international security. One of the definitions that has stood to the taste of times is that of Berto Jongman and Alex Schmidt in 1988.That terrorism is the use of violence, the techniques used, the nature about the use of fear, the level of organization and ideology. The discussion will be centered on two main types of terrorism, organized terrorism and cyber terrorism, following its evolution in international conflicts.
  • 5. How were these ideologies developed? The ideology (terrorism) originated as a state action, with the French revolution state reign of terror in political affairs. The term terrorism which appeared both in English and French usage in the 18 century was associated with any use of violence to achieve a political goal. The American and French revolutions unleashed the idea that people could overthrow dictatorial rules. The concept appeared in the Arab convention for the suppression of terrorism of 1998 in Egypt, with a clear definition with precise components. In Arab world there is a challenge in authorities between the religious and state leader. In Iran 1973 the spiritual leader kick out the state leader, because the spiritual leader has the final decision. Also, Al- Qaeda (organizational structure 1988-2001), Talibans, ISIS and ISIL, the rise of youths like the Arab spring in Tunisia. In Nigeria 2009, Boko-Haram started getting youths support and economic assistance through kidnapping of foreigners and nationals in Cameroon and Nigeria. Though the focus has been on Boko-Haram, several radical groups like Al Shabab,M23 and Seleka rebels exist. One of their main objective is the fight against social and economic injustice, but Boko-Haram believes that democracy is for anti-Muslims (Western Education is a sin). Malcolm W. Nance (2013), Terrorist Recognition Handbook, A Practitioner’s Manual for Predicting and Identifying Terrorist Activities, Third Edition
  • 6. What are the types of terrorism involved? We could say that, this is the age of terrorism, as major security challenge of the post cold war era. There are many types of terrorism as conceived by researchers. The Cameroon community of political sciences evoked four main types of terrorism; individual terrorism, organized terrorism, state terrorism and cyberterrorism. But the discussion will be base on two, as follows;  Organized terrorism (example Al Qaeda and Bok-Haram)  Cyber terrorism (examples of cyberterrorist activities on the web; Irhabi 007, Al-Jinan, Inhiyar Al-Dolar, 'Abu Syf3r' Defaces Internet Haganah and Q8Army) The above has also been related radical ideologies of spiritual leaders like Imam Samudra (Sentenced to death for 2002 Bali bombings) and Imam Abubakar Shekau. If the main objective is to establish caliphates, why then use violence. But the problem has always been whether terrorism can be just. As such, discussions have centered on two cases; If these ideologies are for religious issues or for political issues. David Altheide in Terrorism and the Politics of Fear Dorothy E. Denning in The Jihadi Cyber terror Threat E. Alshech, Cyberspace as a Combat Zone: The Phenemenon of Electronic Jihad, MEMRI, No. 329, Feb. 27, 2007 http://haganah.org.il/haganah/
  • 7. Why do they engage in terrorism? Trotsky once said “ Maybe the war does not interest you but war is interested in you”. They are many reasons evoked by radical individuals or groups engaged in the new world system. Some of these arguments are as follows;  They are resisting against political oppression in and out of their countries.  The political situation in Israel-Palestine and Iraq following the U.S intervention but also the proliferation of foreign interventions in Syria and Libya  Arab youths against international system example Otto man empire  Against repression; Arab spring and against H. Mubarack  Against Israel; alliance with the Anglo- Americans and insecurity of the Sunnites  Websites that harm or are offensive to Islam are been defaced example defacement of Danish websites (caricature of Mohammed) and attack against Vatican Website Dorothy E. Denning in The Jihadi Cyber terror Threat http://www.zone-h.org/en/defacements/mirror/id=3281674/
  • 8. What is an insurgency? According to the 1970 writer, Richard H. Sanger the modern era has experienced seven great waves of insurgencies from the English Revolution of 1648-88 to the cyclone of violence that swept the Third World after World War II. Insurgency refers to the use of low-level, protracted violence to overthrow a political system or force some sort of fundamental change in the political and economic status quo with a certain level of persistence. After all, it has been one of the most pervasive types of conflict throughout history and todays epidemic. Throughout this discussion, we are encouraged to think critically and analytically about the complex causes of many contemporary issues and problems based on the radicalization of some Muslims. International conflicts is faced with two ideologies; that of terrorism and insurgency. The contemporary focus, is which of the current team belongs to an insurgency or terrorist organization. In security presentation, Saron argued that; ISIS, Al Shabab, Talibans and Anti Balaka are insurgencies, while Al Queada, Boko-Haram and Hezbollah could be considered terrorist organizations. Though the have been some contradiction to this statement, based on the recent development of geopolitics. Richard H. Sanger (1970), Insurgent Era: New Patterns of Political, Economic, and Social Revolution, revised edition, Washington: Potomac Books, 1970, pp. 2-4. Raj Desai and Harry Eckstein (1990), "Insurgency: The Transformation of Peasant Rebellion," World Politics, Vol. 42, No. 4, July 1990, pp. 443-444.
  • 9. What are the difference between terrorism and insurgency? Terrorism Insurgency  The use of violence to express a certain ideology. An example bombing of Hiroshima,9/11 by Al Qaeda, Boko-Haram attacks on northern Nigeria and Cameroon. An weapons usually used are WMD and sophisticated technology (cyber attacks).  Terrorism remains a major threat at the national, regional and international peace and security. This is because, there is deliberate violation of international law and human rights. An example is Boko-Haram attack on soft targets like churches, markets, security base.  The persistence use of violence because of frustration and the weakness to challenge the political order through conventional military ways. Example is ISIS and the Anti Balaka in Central Africa Republic.  The development of new trends, will be point in the next decades. It may be related to terrorism on this point, the spiritual insurgency which is based on political violence and religion. Also associated with secularization, the strains of modernization spawned a religious renaissance. An example is the Al Shabab attack on Kenya
  • 10. Are these ideologies just or unjust? The study of international security is more than human violence, war is the worst idea that can ever be evoked when discussing security at the national, regional and international level. This account for the creation of legal jurisdictions like the international criminal court (ICC) and the international court of justice (ICJ). The idea of justifying war may seem bizarre, especially in Christian countries, which religion is anti-militarist. It becomes paradoxical because the Christians have found justification for the war a just war, they argue that is a war in accordance with law, natural law and morality. This concept is ambiguous, because they are always leaders or countries ready for war. But war can only be justified if defensive and conducted to protect the weakest. Just war is a concept first evoked by the “West”, meanwhile the concept of jihad was neglected or never discussed. which is a form of just war because it is holy war. It is a codified principle in the Holy Koran, which is eventually not used today because of the new world order (Terrorism).As such, terrorism and insurgency are major security threats to the world and can never be considered just. CAMEROON COMMUNITY OF POLITICAL SCIENCES 2012-2013
  • 11. Recommendations  The Westphalia treaty should be seriously implemented, with its core principles of ; sovereignty, equality and non interference in other state.  The respect for every religion, language and person. NB: mostly the caricature or satiric images of the Muslim religious leader, be it on social networks or journals.  There should be the control of the arm industry and weapons of mass destruction.  The definition of a state should be revised. This is because, if a state is based on a territory, sovereignty and a government, why is Palestine not given that opportunity.