logo

Islamic State’s Financing [Recurso electrónico] PDF : sources, Methods and Utilisation

By: Material type: ArticlePublication details: S. Rajaratnam School of International StudiesISSN:
  • 2382-6444
Subject(s): Online resources: In: Counter Terrorist Trends and Analysis Counter Terrorist Trends and Analyses . -- Vol. 9 No. 5 (May 2017) p. 13-22Summary: This paper examines multiple sources of Islamic State (IS) terrorist group’s funding and some counter-mechanisms deployed by the global anti-IS coalition. The paper analyses: a) how IS exploits the volatile political situations and security vulnerabilities across the Middle East and North Africa to generate funding, and b) exposes the dichotomy between the terrorist group’s religious rhetoric and its criminal enterprises. The paper aims to help counter-terrorism practitioners and scholars generate counternarrative responses to enhance the efficacy of a state’s counter terrorism (CT) and counter violent extremism (CVE) strategies against IS.
Item type: Analíticas
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Cover image Item type Current library Home library Collection Shelving location Call number Materials specified Vol info URL Copy number Status Notes Date due Barcode Item holds Item hold queue priority Course reserves
Centro de Análisis y Prospectiva de la Guardia Civil Biblioteca Digital Available 2018765
Total holds: 0

This paper examines multiple sources of Islamic State (IS) terrorist group’s funding and some counter-mechanisms deployed by the global anti-IS coalition. The paper analyses: a) how IS exploits the volatile political situations and security vulnerabilities across the Middle East and North Africa to generate funding, and b) exposes the dichotomy between the terrorist group’s religious rhetoric and its criminal enterprises. The paper aims to help counter-terrorism practitioners and scholars generate counternarrative responses to enhance the efficacy of a state’s counter terrorism (CT) and counter violent extremism (CVE) strategies against IS.

There are no comments on this title.

to post a comment.
Share