FEATURED | Spread and Expansion of Islamic Terrorist Groups in the Contemporary World by Flavio Sanguigni

By Flavio Sanguigni  ‘Islamic groups have conducted the most significant, deadly, and profoundly international attacks.’ (Ropoport...

FEATURED | Spread and Expansion of Islamic Terrorist Groups in the Contemporary World by Flavio Sanguigni

By Flavio Sanguigni 

‘Islamic groups have conducted the most significant, deadly, and profoundly international attacks.’ (Ropoport, 2012: 51)

Groups engaged in confrontations with Governments, antagonist parties or with forces that are occupying disputed territories, are often on the edge, and can feel the need to resort to terrorist practices (Hoffman, 2006: 23-24-26). When this choice is made, they try to disseminate their ideology as much as possible and in this way try to increase the number of their active and passive supporters (Hoffman, 2006: 28).

Ropoport (2012: 41-42-43), accounts for four waves of terrorism of which, the end of the third and the whole of the fourth are noteworthy for this essay’s purpose. They refer to a transformation of some Middle Eastern terrorist organizations, from nationalistic to religious and, in the fourth wave, give a full insight into the dynamics of those organizations which while originating from within the religious wave develop particular characteristics into a much wider framework.

Nevertheless, when chosen as weapon within ethnic, religious, social or political confrontations, Islamic terrorism is driven by specific factors. The reason for such choice can be contingent to conflict’s nature and/or extreme interpretation of religious creed (Kiras, 2013: 174); Lutz, and Lutz, 2013: 278-286). In this extent, within this short paper, the problem’s focal aspects will find possible justification through the following arguments:

A short background of the historical and political context behind the Islamic terrorism will be provided to address some of the possible causes of the same.

The Salafist/Jihadist creed/doctrine and developments will be analyzed as the funding principles behind two contemporary and wide spread bloody Islamic terrorist groups, de facto representing the third millennium of the phenomenon.

The diffusion and growth of Islamic terrorist groups will be debated. In this section, two short case studies, respectively on Al Qaeda and the ISIS, functional to show the status quo of the phenomenon, will be explored. 

The main outcomes that determine the spread and expansion of Islamic terrorist groups in the contemporary world will be summarized and therefrom, specific conclusive considerations will be drawn.

Background of the historical and political context behind the phenomenon

Hoffman (2006: 43) dates the initial terrorist acts of the contemporary world, after the end of the Second World War. He addresses them as part of the ‘anticolonial- and postcolonial-era’. Using the case of colonial Palestine as illustration, he points out how the Jewish terrorists, in their bid to coerce Britain to accede to their requests, exploited the clear international concern about the harsh reactions of the British when attempting to block the actions of the Jewish terrorists (Hoffman, 2006: 46-50).

Ropoport (2012: 51) accounts for an overlay of ethnic and sacred motivations for terrorism already in his third wave. Correspondingly, only in the fourth wave he posits religion and Islam in particular, as the central catalyst for the phenomenon.

In addition, sundry scholars (Migaux, 2007: 256); Fine, 2008); Springer et al, 2009: 22-26); Ropoport, 2012: 52), individuate, in 1979, two major events triggering Islamic terrorism: the Iranian Revolution and the Russian invasion of Afghanistan.

Consequently at the time, Iran backed and stimulated Shi'a terrorism in the Middle East and in Arabian Peninsula, whilst Sunni volunteers were supported by US against Soviets in Afghanistan.

Accordingly, Lebanon, with its multifaceted religious actors (Shi'a, Sunni and Druze Muslims, Maronite, Greek Orthodox, Greek Catholic, and Armenian Christians) became the battlefield for bloody statements, propaganda, and terrorist training camps (Pike, 2011).

Subsequently, the Palestine dispute became the epitome of where two ethnic groups, two creeds, one territory, the holocaust and the end of an international obligation defined the status quo, and rose as Islam’s flag. For long time, the Palestinian struggle, embodied (and provided a justification) in the Muslim world, the need of firm actions against the occupation of territories and Holy sites (Springer et al, 2009: 20-21); Al Raffie, 2012: 18).

Salafist/Jihadist creed/doctrine, and developments

Leaving out Abd al-Wahhab and Ibn Taymiyya, contemporary groundwork of the Salafist creed, dates back in the mid-sixties when the Egyptian militant of the Muslim brotherhood, Sayyid Qutb, wrote a guide, named Milestones. Being the base for the document, the Quran is taken as the fundament of Islam and along with the Sunnah, as the only truth above all the other possible creeds, that by default, resulted into their status as being fraudulent and repressive (Rabasa et al, 2006: 11); Stout, 2009: 878); Al Raffie, 2012: 17); Hayat, 2014: 38-39-40-41).

As consequence, Qutb forecasted a time, yet to come, where it would be possible to worship Allah in the unique correct way as per his interpretations of the holy texts. The idea of Allah as the only entity to accede obedience, and the rewards connected to this, is present in many parts of his narrative (Stout, 2009: 878); Hayat, 2014: 38-39-40-41).

In his book, he proposed that until then, the whole of the Muslim people (Ummah), had been influenced and spoiled by false ideas, and due to a profound ignorance (Jahiliyya) coming along with the latter. Therefore, the leaders had to be thought to live and rule according to the Islamic commandments (Sharia) to be further enforced in all Muslim territories along with disseminating the teachings among the Muslims around the world. Whoever would not follow these would be judged according to the takfir, considered the apostate of Islam, and candidate for castigation through death. (Rabasa et al, 2006: 11); Stout, 2009: 878); Al Raffie D. 2012: 15); Hayat, 2014: 38-39-40-41).

Stout (2009: 878), highlights how, for Qutb, and the following Salafi jihadists (among others Ayman al-Zawahiri and bin Laden), there is a clear distinction between Muslims and the rest of the world, conveying that firmly following these ideas, would grant them the ultimate victory through Allah.

The ultimate end goal of the Salafi jihadist, is re-establishing the Caliphate as it was in the ancient Arab world going from Andalusia to the most remote Muslim strongholds in Asia, in order to create the optimum environment to implement the Sharia and so, allow the Ummah to follow Islam in the way Allah requires (Migaux, 2007: 256); Stout, 2009: 879).

Briefly citing Migaux, (2007: 255-258), gives a full insight of the matter:

‘The jihad-by-the-sword—or jihadist—movement, which first emerged in the early 1970s, draws its inspiration from an age-old ideology. But it has taken an aberrant form—the end result of a fundamentalist line of thinking based on a mythicized view of original Islam. Indeed, its goal is the manipulation of excluded and marginalized segments of Islamic societies.’ [jihadist terrorism] ‘has a different goal: to push for mass radicalization in the context of a near-Messianic undertaking.’

Last considerations for this part of the paper, cannot leave aside the fact that modern Islamic terrorist groups, namely al Qaeda, ISIS –the Islamic State - and many of their affiliates, have developed rhetoric narratives, that benefiting from deep knowledge of the West, allowed their well-educated strategist, to include approaches, tactics and ideologies hired out from Marxism-Leninism in general and from revolutions around the world in particular (Rabasa et al, 2006: 10-11); Stout, 2009: 881); Al Raffie, 2012: 14-15-16).

Because of the narratives they developed, one established account, contemplates the Ummah misery, her dishonor, and subjugation due to dishonest regimes and their aberration from real Islam as a result from historical foreign influence. Approaching and providing at ethno-social level an easy motive for their fate, and exploiting existent criticisms, terrorist groups try to go straight at the heart of the people (Al Raffie, 2012: 17).

Diffusion and growth of Islamic terrorist groups

As previously seen, the Iranian revolution, and the Russian invasion of Afghanistan, ignited fuel on an already blazing environment. It is interesting to note that Shi'a terrorism, although having revolutionary origins stayed pretty much confined in the countries where the terrorist organization was operating and/or, in the nearby countries where was convenient exercise some form of influence (Hayat, 2014: 38-39-40-41).

On the contrary, Jihadi terrorism moved and expanded accordingly to needs and opportunities as they presented. It is worth highlighting, that despite the confrontation among these two currents, Jihadi terrorism, to some extent, borrowed the revolutionary connotation of Shi'a, to support what they define as a revolutionary global counter-crusade. While from time to time, and erratically, they supported each other with subtle propaganda statements (Huntington (1993: 35); Hayat, 2014: 38-39-40-41).

Spread of Islamic Terrorist Groups

Migaux (2007: 292-293) and Hayat, (2014: 41), among others, share the same view on the relevant Afghanistan events in 1979 and about the reasons why US, Saudi Arabia and Pakistan, supported the Mujahidin.

The main objective for the US was containing USSR, and in some extent Iran as well, in yet another proxy war. Saudi Arabia after few terror attacks, wanted to have a sort of control on young Sunni extremist also in order to have a possible weapon available, whilst for Pakistan was enough to fight an India supporter (Migaux, 2007: 292-293); Hayat, 2014: 41).

Afghanistan was the place where all the Muslim had to fight the Jihad, a battlefield where weapons, training, and money where widely available. Extreme interpretations of the Quran were thought in order to motivate and commit volunteers arriving from the Muslim world reaching a peak of 20,000 in 1980 (Migaux, 2007: 292-293); Hayat, 2014: 41).

From the Afghan war, two different outcomes heavily contributed to the spread of Islamic terrorism. First, due to the Soviet defeat, blind believers and able Muppet masters conveyed the universal message, that Allah had rewarded his fighters with invulnerability leading them to victory (Fine, 2008). Second, these well trained, fearless, and now extremely radicalized fighters were mostly returning to their countries. Migaux (2007: 293-297) accounts for at least 17 different countries where these Jihad’s Mujahidin, returning, have become a reference point for local extremism. 

Huntington (1993: 24-32), points out, that diverse cultures can be ‘defined both by common objective elements, such as language, history, religion, customs, institutions, and by the subjective self-identification of people.’ Additionally, he highlights an ongoing ‘Clash of Civilizations’, where the Muslim world feels threatened by the West.

Following the Gulf wars and the enduring deployment of western forces in the Arabic peninsula, Islamic terrorist groups spread the idea that Islam and the Arab civilization was under attack. Oil reserves and Holy sites virtual occupation, provided the needed evidence for the concept. Furthermore, local governments under external influence were buying western weapons. It is easy to understand how these arguments enabled, a high degree of self-identification among Muslims.

Al Qaeda has had a significant role in the spreading of Islamic terrorism. It represents the ground zero of real and active terrorism’s internationalization. His leader, Osama bin Laden and his seniors, like Ayman al-Zawahiri, shaped a message fully exploiting the tensions between the West and the Muslim world. The base, as they named it, as first worldwide terror enterprise, acted as catalyst for projecting Ummah’s grievances and frustrations, on the west in general, and on US and Israel in particular. (Hoffman, 2006: 93); Lutz, and Lutz, 2013: 274).

The terror network started using the worldwide Mujahidin’s contacts and, their local linkage along with the ones naturally created by migration, (Goldstein Ferber & Schweitzerand, 2005: 7); Hoffman, 2006: 93); Lutz, and Lutz, 2013: 274), gathering, and controlling members, through the ideal of self-sacrifice, istishhad, as new frontier of the Jihad; being a martyr to be the struggle and fearless for terrain life (Goldstein Ferber & Schweitzerand, 2005: 7).

Al Qaeda organization, aims and actions evolved through diverse stages. At the beginning (early 1990s), it provided support for other groups. By 1998, the activities concentrated on the building of a radical Islamic network against Israel, the Jews and the countries perceived as invaders. Eventually in 2001 a solid organization was in place (Goldstein Ferber & Schweitzerand, 2005: 17-18).

During the network evolution, actions like the 1993 first attack on the World Trade Center, the bombing in Khobar and Dahran, the 1998 simultaneous attacks at the U.S. embassies in Kenya and Tanzania, and the 2000 U.S.S. Cole, showed global capacity for bloodshed. (Goldstein Ferber & Schweitzerand, 2005: 19-20).

After the invasion in Afghanistan as consequence of 9/11, the defeat, and the killing of the leader Osama bin Laden, a new and more flexible organization has been shaped in order to continue the global struggle. Thought operations of associated networks, as showed in Bali – 2002, Madrid - 2004, London - 2005/2007, and Mumbai – 2008, al Qaeda has had a large degree of visibility pursuing the goal of having a world ruled by Islam (Goldstein Ferber & Schweitzerand, 2005: 26); Lutz, and Lutz, 2013: 274).

The last aspect accounting for the spread of Islamic terrorism, is the circumstance that feeble governance in the majority of Islamic countries, including corruption, dictatorial behaviors and dead end in controlling the territories, bear out terrorist narratives. Weak or unfair Governments, undermines society’s trust, and this is especially sensed, when they are backed up by a western country (Huntington, 1993: 32); Springer et al, 2009: 8-9).

Expansion of Islamic Terrorist Groups

Spread and expansion of Islamic terrorist groups are subtly connected. Muslims are currently fighting under the same Islamic flag in the Middle East, in Asia, in different regions of the former USSR, in China, in Pakistan, in India, in Africa, and have had major conflicts in east Europe. Islamic terrorist are committing acts of atrocities in all of these countries, in the nearby ones and in all the others deemed responsible for Islam’s decadence. Contemporary world, with all the technological advances brought the expansion to a level never seen before.

One aspect of the terrorist attacks is that they have to be memorable. This is required in order to frighten the population and possibly pursue the main aims of the group. They have to gain visibility among other comrades, pushing to emulate the gesture and convincing that the tactic is working showing that there is no alternative. When the action is planned, the media coverage of the act is usually taken in consideration, offering footage and recorded interview of the suicide bombers. The value to pay, is that when the media cover such events, they invariably to some extent also authenticate them (Hoffman, 2006: 173-174-175).

Correspondingly, terrorist organizations have developed new capacities compared to the passive media coverage and the possible spread/broadcasting through clandestine radios or printed materials. All the previous means, neither were controllable nor could reach very far. Islamic terrorist groups, have shown deep media handling knowledge, both as creation and marketing (Hoffman, 2006: 197-198); Rabasa et al, 2006: 164).

Therefore, suicide bombers accomplishments, occupation forces harassing civilian and well-chosen pieces of the Quran, are expertly assorted to feed a chain of resentment, odium and retaliation (Hoffman, 2006: 220-221).

In this way, the group’s attitude goes from passive to active. In addition, media footage are released to states and private owned broadcasting companies to target the adversary. A supplementary rhetoric chronicle has been developed and conveyed through web sites, CDs/DVDs production and publications. All this efforts are meant to reach the organization’s members and supporters around the globe, surpassing countries’ borders, and continents. (Hoffman, 2006: 197-198); Rabasa et al, 2006: 164).

In contrast to what happens in Muslim nations, where madrassas are the perfect environment for radicalization and for moulding new generations, in the west, where to communicate is a constitutional right, terrorist often exploit the disorganised vacuum offered by social media and the internet. There they target adolescent, diaspora and migrant communities ‘for propaganda, indoctrination, recruitment, and operations on the scale of the March 2004 Madrid terrorist attack’ (Rabasa et al, 2006: 164); Bott et al, 2009: 54-55-56-57-58-59) Springer et al, 2009: 133); The targeted societies, due to their own system which guarantees personal freedom, are rendered often defenceless (Bott et al, 2009: 54-55-56-57-58-59).

ISIS. This terrorist group resembles many characteristics from others and in particular from al Qaeda from which has seen the genesis in Iraq, but adding a new dimension to the Jihad. In 2014, after having positioned his forces between western Iraq and eastern Syria, it self-named as the Caliphate, ruling on few millions of people in the area (Laub and Masters, 2015).

As the word Caliphate indicates, it refers to the rigid Salafi concept of Islam already discussed previously. An extremely skilful media branch, coupled with filmed infinite ferocity and web based calls, have managed to appeal large numbers of foreign fighters that have joined the Islamic State – grossly 13,000. The Islamic State possibly expanded as consequence of Sunni marginalization in Iraq and Syria. In both cases, it happened due to the exclusion of Sunni from governance, and advantaging, in the case of Iraq the Shi'a political forces (Laub and Masters, 2015).

As lesson learned from the al Qaeda/Islamic State experience so far, it can be clearly deducted that, al Qaeda has accomplished much more than probably expected in terms of disseminating the principles of the Jihad and inflicting pain to the west through martyrdom. By contrast, the Islamic State, after being a branch of al Qaeda in Iraq, took over, reaching for the first time of the modern terrorism era – non including the Taliban such as a more complex environment -, to establish a sharia ruled territory, in an area between progressing and moderate Arab/Muslim modern countries. 


In this paper, the spread and the expansion of Islamic terrorist groups has been approached in a systematic way. Some background on the history connected with the genesis of the phenomenon and the standing political situation, have posed the base for a journey in the Salafi doctrine and her evolution. The Salafi creed resulted as the Islamic terrorist’s manifesto and the driving force for the actions. Analysis of the objective spread for Islamic terrorist groups, has highlighted that the Iranian revolution and the Afghan war started it and contributed heavily to it.

Particularly, the Afghan war spread some radicalized fighters around the world and posed the fundamentalists for the development of al Qaeda. The western invasions exacerbated the ongoing clash among the west and the Muslim world further biased from the terrorists’ messages. As a final possible reason for spread of Islamic terrorism, it has been established that weak governance of Muslim countries has a big responsibility.

Concerning the expansion of Islamic terrorist groups, technology surely takes great part of the blame, in that it is exploited to reach boundaries that were never possible before, and more than this, in a blink of an eye. Among many, an important issue emerged through the references, is that young generations are exposed by social networks and the internet, to self and coerced radicalization, with the risk of even increasing the huge number of fighters joining networks like the one of the Islamic State. By contrast, the technical tools in the hands of western societies are not many. The only possible solution is the social prevention of these risks.


  • Al Raffie D. (2012). Whose Hearts and Minds? Narratives and Counter-Narratives of Salafi Jihadism. [Online] Available from: https://blackboard.staffs.ac.uk/bbcswebdav/pid-1103181-dt-content-rid-1504035_1/courses/BB0000011429/BB0000011429_ImportedContent_20130812035108/304-936-1-PB.pdf, Journal of Terrorism Research, volume 3, Issue 2 - Autumn 2012, [Accessed: 30th March 2014].
  • Bott, C. et al, (2009). Recruitment & Radicalization of School-Aged Youth by international terrorist groups, Final Report, [Online] Available from: http://www.cleanitproject.eu/wp-content/uploads/2012/07/2009-recruitment-and-radicalization.pdf, Prepared for U.S. Department of Education Office of Safe and Drug-Free Schools, Arlington, VA: HOMELAND SECURITY INSTITUTE, [Accessed: 25th May 2015].
  • Fine, J. (2008). Contrasting Secular and Religious Terrorism, [Online] Available from: http://www.meforum.org/article/1826, Middle East Quarterly, Winter 2008, pp. 59-69, [Accessed: 16th March 2015]
  • Goldstein Ferber, S. and Schweitzerand Y. (2005), Al-Qaeda and the Internationalization of Suicide Terrorism, [Online] Available from: http://www.inss.org.il/uploadimages/Import/%28FILE%291188301256.pdf, Memorandum No. 78 November 2005, The Jaffee Center for Strategic Studies (JCSS). Tel Aviv University, [Accessed: 20th March 2014].
  • Hayat, A. (2014). The diffusion of intra-Islamic violence and terrorism: the impact of the proliferation of Salafi/Wahhabi ideologies, [Online] Available from: http://www.rubincenter.org/wp-content/uploads/2014/07/v18n02a05_alvi_PDF.pdf, The Middle East Review of International Affairs (MERIA) Journal, Vol. 18, No 2 (Summer 2014), [Accessed: 20th May 2015].
  • Hoffman, B. (2006). Inside Terrorism, revised and expanded edition. New York: Columbia University Press.
  • Huntington, S. (1993). The clash of civilizations?, [Online] Available from: https://www.foreignaffairs.com/articles/united-states/1993-06-01/clash-civilizations, Foreign Affairs; Summer 1993; 72, 3, p. 22-49, ABI/INFORM Global, [Accessed: 20th March 2015.
  • Kiras, J. D. (2013). Irregular Warfare: Terrorism and Insurgency. In Wirtz, J. (et al) (2013), Strategy in the Contemporary World, 4th edition, chapter 9, p. 173-194. Oxford: Oxford University Press.
  • Laub, Z. and Masters, J. (2015). The Islamic State, [Online] Available from:http://www.cfr.org/iraq/islamic-state/p14811?cid=ppc-Google-grant-isis_backgrounder&gclid=CLLVqPfLu8MCFQTLtAodWjwAsw, Council of Foreign Relations, Backgrounders [Accessed: 20th May 2015].
  • Lutz, B. and Lutz, J. (2013). Terrorism. In Collins, A. (ed) (2013), Contemporary Security Studies, 3rd edition, chapter 19, p. 273-288. Oxford: Oxford University Press.
  • Migaux, P. (2007). The roots of Islamic radicalism. In Chaliand, G. and Blin, A. (ed), (2007), The history of terrorism from antiquity to al Qaeda, chapter 12, p. 255-313. Los Angeles: University of California Press.
  • Pike, J. E. (2011), Lebanon Civil War 1975-1991, [Online] Available from: http://www.globalsecurity.org/military/world/war/lebanon.htm, page last modified: 11-07-2011 03:28:32 ZULU, [Accessed: 15th May 2015].

  • Rapoport, D. C. (2012). The four waves of modern terrorism. In Horgan, J.& Braddock, K (2012). Terrorism Studies: A Reader (pp. 41-60). London: Routledge. Reprinted from: Rapoport, D. C. (2004). Modern terror: the four waves. In A. Cronin & J. Ludes (Eds.) Attacking terrorism: Elements of a grand strategy (p. 46-73). Washington, DC: Georgetown University Press.
  • Springer, D. R. et al, (2009). Islamic Radicalism and Global Jihad. Washington, D.C.: Georgetown University Press.
  • Stout, M. (2009). In Search of Salafi Jihadist Strategic Thought: Mining the Words of the Terrorists, [Online] Available from: http://www.tandfonline.com/doi/abs/10.1080/10576100903185578#.VaFBWG3IlcU, Studies in Conflict & Terrorism, Volume 32, Issue 10-2009, p. 876 — 892, Routledge - Taylor & Francis Group, LLC [Accessed: 20th May 2015].
  • Rabasa, A. et al, (2006). Beyond al-Qaeda. Part 1. The global jihadist movement. [Online] Available from: http://www.rand.org/content/dam/rand/pubs/monographs/2006/RAND_MG429.pdf, Santa Monica, CA: Prepared for the United States Air Force at RAND Corporation. [Accessed: 25th May 2015].


-51,1,3D Technology,2,5G,10,Abkhazia,2,Abortion Laws,1,Academics,11,Accidents,22,Activism,1,Adani Group,6,ADB,13,ADIZ,1,Adults,1,Advertising,31,Advisory,2,Aerial Reconnaissance,13,Aerial Warfare,36,Aerospace,5,Afghanistan,88,Africa,114,Agile Methodology,2,Agriculture,20,AI Policy,1,Air Crash,10,Air Defence Identification Zone,1,Air Defense,7,Air Force,29,Air Pollution,1,Airbus,5,Aircraft Carriers,5,Aircraft Systems,5,Al Nusra,1,Al Qaida,4,Al Shabab,1,Alaska,1,ALBA,1,Albania,2,Algeria,3,Alibaba,1,American History,4,AmritaJash,10,Antarctic,1,Antarctica,1,Anthropology,7,Anti Narcotics,12,Anti Tank,1,Anti-Corruption,4,Anti-dumping,1,Anti-Piracy,2,Anti-Submarine,1,Anti-Terrorism Legislation,1,Antitrust,2,APEC,1,Apple,3,Applied Sciences,2,AQAP,2,Arab League,3,Architecture,3,Arctic,6,Argentina,7,Armenia,30,Army,3,Art,3,Artificial Intelligence,83,Artillery,2,Arunachal Pradesh,2,ASEAN,12,Asia,71,Asia Pacific,23,Assassination,2,Asset Management,1,Astrophysics,2,ATGM,1,Atmospheric Science,1,Atomic.Atom,1,Augmented Reality,8,Australia,58,Austria,1,Automation,13,Automotive,133,Autonomous Flight,2,Autonomous Vehicle,3,Aviation,63,AWACS,2,Awards,17,Azerbaijan,16,Azeri,1,B2B,1,Bahrain,9,Balance of Payments,2,Balance of Trade,3,Bali,1,Balkan,10,Balochistan,2,Baltic,3,Baluchistan,8,Bangladesh,28,Banking,53,Bankruptcy,2,Basel,1,Bashar Al Asad,1,Battery Technology,3,Bay of Bengal,5,BBC,2,Beijing,1,Belarus,3,Belgium,1,Belt Road Initiative,3,Beto O'Rourke,1,BFSI,1,Bhutan,13,Big Data,30,Big Tech,1,Bilateral Cooperation,19,BIMSTEC,1,Biography,1,Biotechnology,4,Birth,1,BISA,1,Bitcoin,9,Black Lives Matter,1,Black Money,3,Black Sea,2,Blockchain,32,Blood Diamonds,1,Bloomberg,1,Boeing,21,Boko Haram,7,Bolivia,6,Bomb,3,Bond Market,2,Book,11,Book Review,24,Border Conflicts,11,Border Control and Surveillance,7,Bosnia,1,Brand Management,14,Brazil,105,Brexit,22,BRI,5,BRICS,20,British,3,Broadcasting,16,Brunei,3,Brussels,1,Buddhism,1,Budget,5,Build Back Better,1,Bulgaria,1,Burma,2,Business & Economy,1230,C-UAS,1,California,5,Call for Proposals,1,Cambodia,7,Cameroon,1,Canada,56,Canadian Security Intelligence Service (CSIS),1,Carbon Economy,9,CAREC,1,Caribbean,10,CARICOM,1,Caspian Sea,2,Catalan,3,Catholic Church,1,Caucasus,9,CBRN,1,Cement,1,Central African Republic,1,Central Asia,82,Central Asian,3,Central Eastern Europe,48,Certification,1,Chad,2,Chanakya,1,Charity,2,Chatbots,2,Chemicals,7,Chemistry,1,Child Labor,1,Child Marriage,1,Children,4,Chile,10,China,587,Christianity,1,CIA,1,CIS,5,Citizenship,2,Civil Engineering,2,Civil Liberties,5,Civil Rights,2,Civil Society,5,Civil Unrest,1,Civilization,1,Clean Energy,5,Climate,67,Climate Change,27,Climate Finance,2,Clinical Research,3,Clinton,1,Cloud Computing,45,Coal,6,Coast Guard,3,Cocoa,1,Cognitive Computing,13,Cold War,5,Colombia,15,Commodities,4,Communication,11,Communism,3,Compliance,1,Computers,40,Computing,1,Conferences,1,Conflict,109,Conflict Diamonds,1,Conflict Resolution,48,Conflict Resources,1,Congo,2,Construction,5,Consumer Behavior,4,Consumer Price Index,5,COP26,4,COP28,1,COP29,1,Copper,2,Coronavirus,107,Corporate Communication,1,Corporate Governance,4,Corporate Social Responsibility,4,Corruption,4,Costa Rica,2,Counter Intelligence,15,Counter Terrorism,81,COVID,9,COVID Vaccine,6,CPEC,8,CPG,4,Credit,2,Credit Rating,1,Credit Score,1,Crimea,4,CRM,1,Croatia,2,Crypto Currency,17,Cryptography,1,CSTO,1,Cuba,7,Culture,5,Currency,8,Customer Exeperience,1,Customer Relationship Management,1,Cyber Attack,7,Cyber Crime,2,Cyber Security & Warfare,116,Cybernetics,5,Cyberwarfare,16,Cyclone,1,Cyprus,5,Czech Republic,4,DACA,1,Dagestan,1,DARPA,3,Data,9,Data Analytics,36,Data Center,3,Data Science,2,Database,3,Daughter.Leslee,1,Davos,1,DEA,1,DeBeers,1,Debt,13,Decision Support System,5,Defense,12,Defense Deals,8,Deforestation,2,Deloitte,1,Democracy,22,Democrats,2,Demographic Studies,2,Demonetization,6,Denmark. F-35,1,Denuclearization,1,Diamonds,1,Digital,39,Digital Currency,2,Digital Economy,11,Digital Marketing,7,Digital Transformation,11,Diplomacy,14,Diplomatic Row,4,Disaster Management,4,Disinformation,2,Diversity & Inclusion,1,Djibouti,2,Documentary,3,Doklam,2,Dokolam,1,Dominica,2,Donald Trump,49,Donetsk,2,Dossier,2,Drones,14,E-Government,2,E-International Relations,1,Earning Reports,4,Earth Science,1,Earthquake,8,East Africa,2,East China Sea,9,eBook,1,Ebrahim Raisi,1,ECB,1,eCommerce,11,Econometrics,2,Economic Justice,1,Economics,44,Economy,111,ECOWAS,2,Ecuador,4,Edge Computing,2,Editor's Opinion,58,Education,67,EFTA,1,Egypt,28,Election Disinformation,1,Elections,48,Electric Vehicle,15,Electricity,7,Electronics,9,Emerging Markets,1,Employment,21,Energy,316,Energy Policy,28,Energy Politics,27,Engineering,24,England,2,Enterprise Software Solutions,8,Entrepreneurship,15,Environment,47,ePayments,13,Epidemic,6,ESA,1,Ethiopia,4,Eulogy,4,Eurasia,3,Euro,6,Europe,15,European Union,236,EuroZone,5,Exchange-traded Funds,1,Exclusive,2,Exhibitions,2,Explosives,1,Export Import,6,F-35,6,Facebook,9,Fake News,3,Fallen,1,FARC,2,Farnborough. United Kingdom,2,FATF,1,FDI,5,Featured,1396,Federal Reserve,4,Fidel Castro,1,FIFA World Cup,1,Fiji,1,Finance,18,Financial Markets,60,Financial Planning,1,Financial Statement,2,Finland,5,Fintech,14,Fiscal Policy,14,Fishery,3,Five Eyes,1,Floods,2,Food Security,27,Forces,1,Forecasting,3,Foreign Policy,13,Forex,4,France,36,Free Market,1,Free Syrian Army,4,Free Trade Agreement,1,Freedom,3,Freedom of Press,1,Freedom of Speech,2,Frigate,1,FTC,1,Fujairah,97,Fund Management,1,Funding,23,Future,1,G20,10,G24,1,G7,4,Gaddafi,1,Gambia,2,Gambling,1,Gaming,1,Garissa Attack,1,Gas Price,23,GATT,1,Gaza,13,GCC,11,GDP,14,GDPR,1,Gender Studies,3,Geneal Management,1,General Management,1,Generative AI,8,Genetics,1,Geo Politics,105,Geography,2,Geoint,14,Geopolitics,10,Georgia,12,Georgian,1,geospatial,9,Geothermal,2,Germany,71,Ghana,3,Gibratar,1,Gig economy,1,Glaciology,1,Global Perception,1,Global Trade,98,Global Warming,1,Global Water Crisis,11,Globalization,3,Gold,2,Google,20,Gorkhaland,1,Government,128,Government Analytics,1,Government Bond,1,GPS,1,Greater Asia,178,Greece,14,Green Bonds,1,Green Energy,3,Greenland,1,Gross Domestic Product,2,GST,1,Gujarat,6,Gulf of Tonkin,1,Gun Control,4,Hacking,4,Haiti,2,Hamas,10,Hasan,1,Health,8,Healthcare,72,Heatwave,2,Helicopter,12,Heliport,1,Hezbollah,3,High Altitude Warfare,1,High Speed Railway System,1,Hillary 2016,1,Hillary Clinton,1,Himalaya,1,Hinduism,2,Hindutva,4,History,10,Home Security,1,Honduras,2,Hong Kong,7,Horn of Africa,5,Housing,16,Houthi,12,Howitzer,1,Human Development,32,Human Resource Management,5,Human Rights,7,Humanitarian,3,Hungary,3,Hunger,3,Hydrocarbon,3,Hydrogen,5,IAEA,2,ICBM,1,Iceland,2,ICO,1,Identification,2,IDF,1,Imaging,2,IMEEC,2,IMF,77,Immigration,19,Impeachment,1,Imran Khan,1,Independent Media,73,India,673,India's,1,Indian Air Force,19,Indian Army,7,Indian Nationalism,1,Indian Navy,28,Indian Ocean,24,Indices,1,Indigenous rights,1,Indo-Pacific,8,Indonesia,21,IndraStra,1,Industrial Accidents,4,Industrial Automation,2,Industrial Safety,4,Inflation,10,Infographic,1,Information Leaks,1,Infrastructure,3,Innovations,22,Insider Trading,1,Insurance,3,Intellectual Property,3,Intelligence,5,Intelligence Analysis,8,Interest Rate,3,International Business,13,International Law,11,International Relations,9,Internet,53,Internet of Things,35,Interview,8,Intra-Government,5,Investigative Journalism,4,Investment,33,Investor Relations,1,IPEF,1,iPhone,1,IPO,4,Iran,207,Iraq,54,IRGC,1,Iron & Steel,4,ISAF,1,ISIL,9,ISIS,33,Islam,12,Islamic Banking,1,Islamic State,86,Israel,145,ISRO,1,IT ITeS,136,Italy,10,Ivory Coast,1,Jabhat al-Nusra,1,Jack Ma,1,Jamaica,3,Japan,92,JASDF,1,Jihad,1,JMSDF,1,Joe Biden,8,Joint Strike Fighter,5,Jordan,7,Journalism,6,Judicial,4,Julian Assange,1,Justice System,3,Kanchin,1,Kashmir,8,Kaspersky,1,Kazakhstan,26,Kenya,5,Khalistan,2,Kiev,1,Kindle,700,Knowledge Management,4,Korean Conflict,1,Kosovo,2,Kubernetes,1,Kurdistan,8,Kurds,10,Kuwait,7,Kyrgyzstan,9,Labor Laws,10,Labor Market,4,Land Reforms,3,Land Warfare,21,Languages,1,Laos,2,Large language models,1,Laser Defense Systems,1,Latin America,83,Law,6,Leadership,3,Lebanon,10,Legal,11,LGBTQ,2,Li Keqiang,1,Liberalism,1,Library Science,1,Libya,14,Liechtenstein,1,Lifestyle,1,Light Battle Tank,1,Linkedin,1,Lithuania,1,Littoral Warfare,2,Livelihood,3,Loans,9,Lockdown,1,Lone Wolf Attacks,3,Lugansk,2,Macedonia,1,Machine Learning,8,Madagascar,1,Mahmoud,1,Main Battle Tank,3,Malaysia,12,Maldives,13,Mali,7,Malware,2,Management Consulting,6,Manpower,1,Manto,1,Manufacturing,16,Marijuana,1,Marine Biology,1,Marine Engineering,3,Maritime,50,Market Research,2,Marketing,38,Mars,2,Martech,10,Mass Media,30,Mass Shooting,1,Material Science,2,Mauritania,1,Mauritius,2,MDGs,1,Mechatronics,2,Media War,1,MediaWiki,1,Medical,1,Medicare,1,Mediterranean,12,MENA,6,Mental Health,4,Mercosur,2,Mergers and Acquisitions,18,Meta,2,Metadata,2,Metals,3,Mexico,14,Micro-finance,4,Microsoft,12,Migration,19,Mike Pence,1,Military,112,Military Exercise,11,Military Service,2,Military-Industrial Complex,3,Mining,16,Missile Launching Facilities,6,Missile Systems,57,Mobile Apps,3,Mobile Communications,12,Mobility,4,Modi,8,Moldova,1,Monaco,1,Monetary Policy,6,Money Market,2,Mongolia,11,Monkeypox,1,Monsoon,1,Montreux Convention,1,Moon,4,Morocco,2,Morsi,1,Mortgage,3,Moscow,2,Motivation,1,Mozambique,1,Mubarak,1,Multilateralism,2,Mumbai,1,Muslim Brotherhood,2,Mutual Funds,1,Myanmar,30,NAFTA,3,NAM,2,Namibia,1,Nanotechnology,4,Narendra Modi,3,NASA,13,National Identification Card,1,National Security,5,Nationalism,2,NATO,34,Natural Disasters,16,Natural Gas,33,Natural Language Processing,1,Nauru,1,Naval Aviation,1,Naval Base,5,Naval Engineering,24,Naval Intelligence,2,Naval Postgraduate School,2,Naval Warfare,50,Navigation,2,Navy,23,NBC Warfare,2,NDC,1,Nearshoring,1,Negotiations,2,Nepal,12,Netflix,1,Neurosciences,7,New Delhi,4,New Normal,1,New York,5,New Zealand,7,News,1290,News Publishers,1,Newspaper,1,NFT,1,NGO,1,Nicaragua,1,Niger,3,Nigeria,10,Nikki Haley,1,Nirbhaya,1,Noble Prize,1,Non Aligned Movement,1,Non Government Organization,4,Nonproliferation,2,North Africa,23,North America,54,North Korea,59,Norway,5,NSA,1,NSG,2,Nuclear,41,Nuclear Agreement,32,Nuclear Doctrine,2,Nuclear Energy,6,Nuclear Fussion,1,Nuclear Propulsion,2,Nuclear Security,47,Nuclear Submarine,1,NYSE,1,Obama,3,ObamaCare,2,OBOR,15,Ocean Engineering,1,Oceania,2,OECD,5,OFID,5,Oil & Gas,384,Oil Gas,7,Oil Price,74,Olympics,2,Oman,25,Omicron,1,Oncology,1,Online Education,5,Online Reputation Management,1,OPEC,130,Open Access,1,Open Journal Systems,1,Open Letter,1,Open Source,4,OpenAI,2,Operation Unified Protector,1,Operational Research,4,Opinion,700,Opinon Poll,1,Optical Communications,1,Pacific,5,Pakistan,182,Pakistan Air Force,3,Pakistan Army,1,Pakistan Navy,3,Palestine,24,Palm Oil,1,Pandemic,84,Papal,1,Paper,3,Papers,110,Papua New Guinea,2,Paracels,1,Partition,1,Partnership,1,Party Congress,1,Passport,1,Patents,2,PATRIOT Act,1,Peace Deal,6,Peacekeeping Mission,1,Pension,1,People Management,1,Persian Gulf,19,Peru,5,Petrochemicals,1,Petroleum,19,Pharmaceuticals,15,Philippines,19,Philosophy,2,Photos,3,Physics,1,Pipelines,5,PLA,2,PLAN,4,Plastic Industry,2,Poland,8,Polar,1,Policing,1,Policy,8,Policy Brief,6,Political Studies,1,Politics,53,Polynesia,3,Pope,1,Population,6,Portugal,1,Poverty,8,Power Transmission,6,Preprint,1,President APJ Abdul Kalam,2,Presidential Election,31,Press Release,158,Prison System,1,Privacy,18,Private Equity,3,Private Military Contractors,2,Privatization,1,Programming,1,Project Management,4,Propaganda,5,Protests,13,Psychology,3,Public Policy,55,Public Relations,1,Public Safety,7,Publications,1,Publishing,8,Purchasing Managers' Index,1,Putin,7,Q&A,1,Qatar,114,QC/QA,1,Qods Force,1,Quad,1,Quantum Computing,4,Quantum Physics,4,Quarter Results,2,Racial Justice,2,RADAR,2,Rahul Guhathakurta,4,Railway,9,Raj,1,Ranking,4,Rape,1,RBI,1,RCEP,2,Real Estate,7,Recall,4,Recession,2,Red Sea,5,Referendum,5,Reforms,18,Refugee,23,Regional,4,Regulations,2,Rehabilitation,1,Religion & Spirituality,9,Renewable,18,Report,4,Reports,50,Repository,1,Republicans,3,Rescue Operation,2,Research,5,Research and Development,25,Restructuring,1,Retail,36,Revenue Management,1,Rice,1,Risk Management,5,Robotics,8,Rohingya,5,Romania,2,Royal Canadian Air Force,1,Rupee,1,Russia,320,Russian Navy,5,Saab,1,Saadat,1,SAARC,6,Safety,1,SAFTA,1,SAM,2,Samoa,1,Sanctions,6,SAR,1,SAT,1,Satellite,14,Saudi Arabia,130,Scandinavia,6,Science & Technology,401,Science Fiction,1,SCO,5,Scotland,6,Scud Missile,1,Sea Lanes of Communications,4,SEBI,3,Securities,2,Security,6,Semiconductor,21,Senate,4,Senegal,1,SEO,5,Serbia,4,Services Sector,1,Seychelles,2,SEZ,1,Shadow Bank,1,Shale Gas,4,Shanghai,1,Sharjah,12,Shia,6,Shinzo Abe,1,Shipping,11,Shutdown,2,Siachen,1,Sierra Leone,1,Signal Intelligence,1,Sikkim,5,Silicon Valley,1,Silk Route,6,Simulations,2,Sinai,1,Singapore,17,Situational Awareness,20,Small Modular Nuclear Reactors,1,Smart Cities,7,Smartphones,1,Social Media,1,Social Media Intelligence,40,Social Policy,40,Social Science,1,Social Security,1,Socialism,1,Soft Power,1,Software,7,Solar Energy,17,Somalia,5,South Africa,20,South America,48,South Asia,482,South China Sea,36,South East Asia,78,South Korea,64,South Sudan,4,Sovereign Wealth Funds,1,Soviet,2,Soviet Union,9,Space,46,Space Station,2,Spain,9,Special Education,1,Special Forces,1,Sports,3,Sports Diplomacy,1,Spratlys,1,Sri Lanka,24,Stablecoin,1,Stamps,1,Startups,43,State of the Union,1,Statistics,1,STEM,1,Stephen Harper,1,Stock Markets,24,Storm,2,Strategy Games,5,Strike,1,Sub-Sahara,4,Submarine,16,Sudan,6,Sunni,6,Super computing,1,Supply Chain Management,48,Surveillance,13,Survey,5,Sustainable Development,18,Swami Vivekananda,1,Sweden,4,Switzerland,6,Syria,112,Taiwan,34,Tajikistan,12,Taliban,17,Tamar Gas Fields,1,Tamil,1,Tanzania,4,Tariff,4,Tata,3,Taxation,25,Tech Fest,1,Technology,13,Tel-Aviv,1,Telecom,24,Telematics,1,Territorial Disputes,1,Terrorism,78,Testing,2,Texas,3,Thailand,11,The Middle East,656,Think Tank,317,Tibet,3,TikTok,2,Tobacco,1,Tonga,1,Total Quality Management,2,Town Planning,3,TPP,2,Trade Agreements,14,Trade War,10,Trademarks,1,Trainging and Development,1,Transcaucasus,21,Transcript,4,Transpacific,2,Transportation,47,Travel and Tourism,15,Tsar,1,Tunisia,7,Turkey,74,Turkmenistan,10,U.S. Air Force,3,U.S. Dollar,2,UAE,140,UAV,23,UCAV,1,Udwains,1,Uganda,1,Ukraine,113,Ukraine War,26,Ummah,1,UNCLOS,7,Unemployment,2,UNESCO,1,UNHCR,1,UNIDO,2,United Kingdom,85,United Nations,28,United States,773,University and Colleges,4,Uranium,2,Urban Planning,10,US Army,12,US Army Aviation,1,US Congress,1,US FDA,1,US Navy,18,US Postal Service,1,US Senate,1,US Space Force,2,USA,16,USAF,22,USV,1,UUV,1,Uyghur,3,Uzbekistan,13,Valuation,1,Vatican,3,Vedant,1,Venezuela,19,Venture Capital,4,Vibrant Gujarat,1,Victim,1,Videogames,1,Vietnam,25,Virtual Reality,7,Vision 2030,1,VPN,1,Wahhabism,3,War,1,War Games,1,Warfare,1,Water,18,Water Politics,8,Weapons,11,Wearable,2,Weather,2,Webinar,1,WeChat,1,WEF,3,Welfare,1,West,2,West Africa,19,West Bengal,2,Western Sahara,2,Whales,1,White House,1,Whitepaper,2,WHO,3,Wholesale Price Index,1,Wikileaks,2,Wikipedia,3,Wildfire,1,Wildlife,3,Wind Energy,1,Windows,1,Wireless Security,1,Wisconsin,1,Women,10,Women's Right,14,Workers Union,1,Workshop,1,World Bank,38,World Economy,33,World Peace,10,World War I,1,World War II,3,WTO,6,Wyoming,1,Xi Jinping,9,Xinjiang,2,Yemen,28,Yevgeny Prigozhin,1,Zbigniew Brzezinski,1,Zimbabwe,2,
IndraStra Global: FEATURED | Spread and Expansion of Islamic Terrorist Groups in the Contemporary World by Flavio Sanguigni
FEATURED | Spread and Expansion of Islamic Terrorist Groups in the Contemporary World by Flavio Sanguigni
IndraStra Global
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content