Javascript must be enabled to continue!
European Security – Islamist terrorist network in Bosnia and Herzegovina (original research)
View through CrossRef
Radical Islamic ideas, individuals, movements, organizations, but also states that have greatly contributed to the radicalization of the existing Muslim population of the Balkans and Bosnia and Herzegovina are not new. Ever since the Middle Ages, with the aggression and genocide committed by the Ottomans, the ideas of jihad have been present in various forms, especially in environments that interpret Islam as a great world religion in such a radical way. There is a noticeable connection between the bearers of jihadist ideas from World War II until today. This article not only provides a historical analysis of the preconditions for the widespread jihadist network that today produces jihad warriors who threaten the entire world but also provides an authentic overview of the preconditions of this global terrorist network to better understand elements such as this network – it’s functions, how it recruits new terrorists and how it uses the ideology of radical Islamists as a motive for committing serious crimes around the world. The schematic structure of the mujahedeen unit with command staff is shown, as well as the fact that the terrorists welcomed the authorities of Bosnia and Herzegovina who tried to hide their presence and to relativize all the worst crimes committed by the mujahedin.
Title: European Security
– Islamist terrorist network in Bosnia and Herzegovina (original research)
Description:
Radical Islamic ideas, individuals, movements, organizations, but also states that have greatly contributed to the radicalization of the existing Muslim population of the Balkans and Bosnia and Herzegovina are not new.
Ever since the Middle Ages, with the aggression and genocide committed by the Ottomans, the ideas of jihad have been present in various forms, especially in environments that interpret Islam as a great world religion in such a radical way.
There is a noticeable connection between the bearers of jihadist ideas from World War II until today.
This article not only provides a historical analysis of the preconditions for the widespread jihadist network that today produces jihad warriors who threaten the entire world but also provides an authentic overview of the preconditions of this global terrorist network to better understand elements such as this network – it’s functions, how it recruits new terrorists and how it uses the ideology of radical Islamists as a motive for committing serious crimes around the world.
The schematic structure of the mujahedeen unit with command staff is shown, as well as the fact that the terrorists welcomed the authorities of Bosnia and Herzegovina who tried to hide their presence and to relativize all the worst crimes committed by the mujahedin.
Related Results
Vessels from Late Medieval cemeteries in the Central Balkans
Vessels from Late Medieval cemeteries in the Central Balkans
Although a rare occurrence in late medieval cemeteries, vessels have been
found on almost all major sites of the period, such as Novo Brdo, Trgoviste,
Reljina Gradina and the...
Contemporary Terrorist Challenges and Threats in Europe
Contemporary Terrorist Challenges and Threats in Europe
This article generally contains two parts. One is a theoretical approach to dealing with the phenomenon of terrorism as well as international terrorism. Within the first part, a un...
Implementing Security in IOT Systems Via Blockchain
Implementing Security in IOT Systems Via Blockchain
With today’s day and age rapidly going digital, the emergence of Internet of Things has become prominent and IoT systems are now being applied to almost every field. IoT systems ca...
ANDROID BASED SECURITY AND REMOTE SURVEILANCE SYSTEM
ANDROID BASED SECURITY AND REMOTE SURVEILANCE SYSTEM
Mobile phones have been important Electronic devices in our life. Consequently, Home automation and security system becomes one of the prominent futures on mobile devices. In this ...
Russian Bases Abroad: Security Policy or Power Projection?
Russian Bases Abroad: Security Policy or Power Projection?
After the collapse of the bipolar system, the Soviet Union, and then its heir, the Russian Federation, lost its position as a global player in favour of US hegemony. The arms race ...
LIVELIHOOD SECURITY OF SCHEDULED CASTE FARMERS THROUGH INTEGRATED FARMING SYSTEM
LIVELIHOOD SECURITY OF SCHEDULED CASTE FARMERS THROUGH INTEGRATED FARMING SYSTEM
The study was conducted in purposively selected Chickballapura district, a total sample of 271 respondents was purposively selected for the study. Data was collected by using struc...
SECURITY AND PRIVACY MECHANISM USING BLOCKCHAIN
SECURITY AND PRIVACY MECHANISM USING BLOCKCHAIN
Block chain being a foundational technology impacting and attracting a wide range of applications has become predominant in solving the problem of privacy preserving and security i...
We're Closer than I Thought: Social Network Heterogeneity, Morality, and Political Persuasion
We're Closer than I Thought: Social Network Heterogeneity, Morality, and Political Persuasion
Literature in the area of social networks indicates that increases in perceived social network attitudinal heterogeneity generate increased openness to attitude change. Recent evid...