Until just moments before the arrest of the Indian cell, here last June, the Islamic State’s cyberplanners kept in near-constant touch with the men, according to the interrogation records of three of the eight suspects obtained by The New York Times.
As officials around the world have faced a confusing barrage of attacks dedicated to the Islamic State, cases like Mr. [Mohammed Ibrahim] Yazdani’s offer troubling examples of what counterterrorism experts are calling enabled or remote-controlled attacks: violence conceived and guided by operatives in areas controlled by the Islamic State whose only connection to the would-be attacker is the internet.
In the most basic enabled attacks, Islamic State handlers acted as confidants and coaches, coaxing recruits to embrace violence. In the Hyderabad plot, among the most involved found so far, the terrorist group reached deep into a country with strict gun laws in order to arrange for pistols and ammunition to be left in a bag swinging from the branches of a tree.
For the most part, the operatives who are conceiving and guiding such attacks are doing so from behind a wall of anonymity.
Read it all.
Filed under: * Culture-Watch Blogging & the Internet Science & Technology Violence * Economics, Politics Defense, National Security, Military Terrorism * Theology Anthropology Ethics / Moral Theology
Posted February 4, 2017 at 10:00 am
To comment on this article: Go to Article ViewThe URL for this article is http://www.kendallharmon.net/t19/index.php/t19/article/67763/
© 2017 Kendall S. Harmon. All rights reserved.
For original material from Titusonenine (such as articles and commentary by Dr. Harmon) permission to copy and distribute free of charge is granted, provided this notice, the logo, and the web site address are visible on all copies. For permission for use in for-profit publications, please email KSHarmon[at]mindspring[dot]com
<< Return to Mobile view (headlines)