In this Book

summary

The horrific and devastating events of September 11, 2001 changed the world's perception of Al Qaeda. What had been considered a small band of revolutionary terrorists capable only of attacking Western targets in the Middle East and Africa suddenly demonstrated an ability to strike globally with enormous impact. Subsequent plots perpetuated the impression of Al Qaeda as a highly organized and rigidly controlled organization with recruiters, operatives, and sleeper cells in the West who could be activated on command.

We now know, however, that the role of Al Qaeda in global jihadist plots has varied significantly over time. New York Police Department terrorism expert Mitchell D. Silber argues that to comprehend the threat posed by the transnational jihad movement, we must have a greater and more nuanced understanding of the dynamics behind Al Qaeda plots. In The Al Qaeda Factor he examines sixteen Al Qaeda-associated plots and attacks, from the 1993 World Trade Center bombing to today. For each case, he probes primary sources and applies a series of questions to determine the precise involvement of Al Qaeda. What connects radicalized groups in the West to the core Al Qaeda organization in the borderlands of Afghanistan and Pakistan? Does one of the plotters have to attend an Al Qaeda training camp or meet with an Al Qaeda trainer, or can they simply be inspired by Al Qaeda ideology? Further analysis examines the specifics of Al Qaeda's role in the inspiration, formation, membership, and organization of terrorist groups. Silber also identifies potential points of vulnerability, which may raise the odds of thwarting future terrorist attacks in the West.

The Al Qaeda Factor demonstrates that the role of Al Qaeda is very limited even in plots with direct involvement. Silber finds that in the majority of cases, individuals went to Al Qaeda seeking aid or training, but even then there was limited direct command and control of the terrorists' activities—a sobering conclusion that demonstrates that even the destruction of Al Qaeda's core would not stop Al Qaeda plots.

Table of Contents

restricted access Download Full Book
  1. Cover
  2. restricted access
    • Download PDF Download
  1. Title Page
  2. restricted access
    • Download PDF Download
  1. Copyright Page
  2. restricted access
    • Download PDF Download
  1. Table of Contents
  2. pp. v-vi
  3. restricted access
    • Download PDF Download
  1. Introduction
  2. pp. 1-7
  3. restricted access
    • Download PDF Download
  1. Part I. Al Qaeda "Command and Control"
  1. Chapter 1: 9/11 (New York, Washington, D.C., and Shanksville, Pennsylvania, 2001)
  2. pp. 11-23
  3. restricted access
    • Download PDF Download
  1. Chapter 2: Shoe Bombers' Plot (Paris-Miami, 2001)
  2. pp. 24-35
  3. restricted access
    • Download PDF Download
  1. Chapter 3: Operation Overt (United Kingdom-United States, 2006)
  2. pp. 36-54
  3. restricted access
    • Download PDF Download
  1. Part II. Al Qaeda "Suggested/Endorsed" Plots
  1. Chapter 4: Millennium Plot (Los Angeles, 1999)
  2. pp. 57-67
  3. restricted access
    • Download PDF Download
  1. Chapter 5: Operation Rhyme (London, 2004)
  2. pp. 68-82
  3. restricted access
    • Download PDF Download
  1. Chapter 6: Operation Crevice (United Kingdom, 2004)
  2. pp. 83-106
  3. restricted access
    • Download PDF Download
  1. Chapter 7: Operation Theseus (London, July 7, 2005)
  2. pp. 107-127
  3. restricted access
    • Download PDF Download
  1. Chapter 8: Operation Vivace (London, July 21, 2005)
  2. pp. 128-143
  3. restricted access
    • Download PDF Download
  1. Chapter 9: Operation Dagger (Copenhagen, 2007)
  2. pp. 144-152
  3. restricted access
    • Download PDF Download
  1. Chapter 10: Operation Highrise (New York, 2009)
  2. pp. 153-165
  3. restricted access
    • Download PDF Download
  1. Part III. Al Qaeda "Inspired" Plots
  1. Chapter 11: Tradebom Plot (World Trade Center, New York, 1993)
  2. pp. 169-183
  3. restricted access
    • Download PDF Download
  1. Chapter 12: Madrid Train System (March 11, 2004)
  2. pp. 184-205
  3. restricted access
    • Download PDF Download
  1. Chapter 13: Hofstad Group Plots (Netherlands, 2004-5)
  2. pp. 206-223
  3. restricted access
    • Download PDF Download
  1. Chapter 14: Operation Pendennis (Australia, 2005)
  2. pp. 224-244
  3. restricted access
    • Download PDF Download
  1. Chapter 15: Operation Osage (Canada, 2006)
  2. pp. 245-259
  3. restricted access
    • Download PDF Download
  1. Chapter 16: The Al Qaeda Non-Plot: The Lackawanna Cluster (2002)
  2. pp. 260-271
  3. restricted access
    • Download PDF Download
  1. Conclusion
  2. pp. 273-297
  3. restricted access
    • Download PDF Download
  1. Afterword
  2. pp. 299-300
  3. restricted access
    • Download PDF Download
  1. Notes
  2. pp. 301-343
  3. restricted access
    • Download PDF Download
  1. Index
  2. pp. 345-357
  3. restricted access
    • Download PDF Download
  1. Acknowledgments
  2. pp. 359-360
  3. restricted access
    • Download PDF Download
Back To Top

This website uses cookies to ensure you get the best experience on our website. Without cookies your experience may not be seamless.