Advertisement

Baseless Jihad

  • Khaled Al-Hashimi
  • Carolin Goerzig
Chapter

Abstract

According to conventional counterterrorism approaches, terrorist groups should be disintegrated and isolated. The corresponding strategy is to make terrorist groups and their ideologies unattractive and prevent them from building a base. Yet weakening terrorists’ support can have an ambivalent effect and does not necessarily guarantee a reduction in violence. Such is the case illustrated by the inner-Islamic debate. After al-Jamaa al-Islamiyya’s ideological revisions, the Egyptian Islamic Jihad (al-Jihad) soon came to emulate al-Jamaa’s change of mind while al-Qaida ignored the calls to cease violence and instead labeled al-Jamaa members traitors and government agents. Why, the question arises, did one group come to choose moderation while the other did not? The findings of this study are counterintuitive yet conclusive. A closer look at both groups quickly reveals that the Egyptian Islamic Jihad has a group of followers while there was and still is no consistent support base standing behind al-Zawahiri, second in command of al-Qaida. But whereas some authors describe the group as the leaderless jihad, this chapter looks at the implications of a baseless jihad and argues that it is precisely the lack of a defined support base which helps to explain how al-Qaida’s “leaders” resist a ceasefire.

Keywords

Support Base Religious Text Senior Leader Selective Inducement Islamic State 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. Abdellah, N. I. et al. (2002). Harma Al Ghouloun Fi Al Din Wua Takfir Al Muslimin. Cairo: Islamic Turath Book Shop.Google Scholar
  2. Al-Sharif, A. M. et al. (2002). Tasslit al-Addwaa ala ma Waqaa fi al-Jihad min al-Akhtaa. Cairo: Islamic Turath Book Shop.Google Scholar
  3. Al-Zawahiri, A. (2001). Knights Under the Prophet’s Banner. London: Alsharq Al-Awsat.Google Scholar
  4. Al-Zayyat, M. (2004). The Road to Al-Qaida. London: Pluto.Google Scholar
  5. Ashour, O. (2007). Lions tamed? An inquiry into the causes of de-radicalization of the Egyptian Islamic group. Middle East Journal, 61(4), 596–625.Google Scholar
  6. Bargouti, T. (2008). The Umma and the Dawla—the Nation State and the Arabic Middle East. London: Pluto.Google Scholar
  7. Gerges, F. A. (2005). The Far Enemy. Why Jihad Went Global. Cambridge: Cambridge University Press.Google Scholar
  8. Gunaratna, R. (2002). Inside Al-Qaida—Global Network of Terror. London: C. Hurst.Google Scholar
  9. Hafez, M. (2003). Why Muslims Rebel. London: Lynne Rienner.Google Scholar
  10. Hafez, O. I. et al. (2002). Mubadara Waq’f Al Anf - Ru’uia Waquiiya wa Nazra Shariia. Cairo: Islamic Turath Book Shop.Google Scholar
  11. Halawi, J. (2007a). Jihad reconsidered. Al-Ahram Weekly, 874.Google Scholar
  12. Halawi, J. (2007b). Bidding violence farewell. Al-Ahram Weekly, 872.Google Scholar
  13. Khatib, A. (2007). Al Jihad’s revisions scare Bin Laden and Al-Zawahiri. Al-Masry Al-Youm, Cairo. November 11, 2007.Google Scholar
  14. Rapoport, D. (2003). The four waves of rebel terror and September 11. In C. W. Kegley (Ed.), The New Global Terrorism (pp. 36–51). Upper Saddle River, NJ: Prentice Hall.Google Scholar
  15. Rashwan, D. (2009). the renunciation of violence by Egyptian jihadi organizations. In T. Bjorgo and J. Horgan (Eds.), Leaving Terrorism Behind (pp. 113–132). London: Routledge.Google Scholar
  16. Raswhan, D. (2007). The obstacle course of revisions: Gamaah versus jihad. Al-Ahram Commentary, 80.Google Scholar
  17. Sageman, M. (2008). Leaderless Jihad. Terror Networks in the Twenty-First Century. Philadephia, PA: University of Pennsylvania Press.Google Scholar
  18. Schafey, M. (2007). Jailed Islamists revise jihad concept. Asharq Al-Awsat, London, November 26, 2007.Google Scholar
  19. Zohdi, K. et al. (2004). Istratigia wa Tafjirat Al-Qaida—al-Akhtaa wa al-Akhtar. Cairo: Islamic Turath Book Shop.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2011

Authors and Affiliations

  1. 1.Technical University BerlinBerlinGermany
  2. 2.EU Institute for Security StudiesParisFrance

Personalised recommendations